Sie sind auf Seite 1von 25

SOFTWARE REQUIREMENT

SPECIFICATION ON WEB BROWSER

BY: SUSHANT TANEJA (0671563107)


SHAGUN MAHESHWARI (0801563107)
SUGANDHA SETH (0881563107)
ROHIT GUPTA (0911563107)
1. INTRODUCTION
This document aims at defining the overall software requirements for
‘WEB BROWSER’. Efforts have been made to define the requirements
exhaustively and accurately.

1.1 PURPOSE
This document describes the capabilities that will be provided by the
software applications ‘WEB BROWSER’. Its purpose is to display the
information on the website in a net and organize way; it also helps to
navigate the web easily. These programs interpret code (HTML) and display
information from WWW. The intended audiences are the anonymous
customers.

1.2 SCOPE
A web browser is a software application which enables
a user to display and interact with text, images, videos,
music, games and other information typically located on
a web page at a website on the World or a local area
network. Text and images on a web page can
contain hyperlinks to other web pages at the same or
different website. Web browsers allow a user too quickly and
easily access information provided on many web pages at
many web sites by traversing these links.

1.3 DEFINITIONS, ACRONYMS, ABBREVIATIONS


. Definitions:
1. WWW: It is a set of large interlinked hypertext
documents accessed via internet.
2. HTML: It is a predominant markup language for the
web pages. It is written in the form of ‘tags’ in
angle brackets.
3. CSS: is a style sheet language used to describe the presentation
(that is, the look and formatting) of a document written in a
markup language.
4. Protocol: protocol is a convention or standard that controls or
enables the connection, communication, and data transfer
between computing endpoints

Acronym and abbreviation:


1. WWW - world wide web
2. HTML - hypertext markup language
3. HTTP - hypertext transfer protocol
4. IEEE - Institute of Electrical & Electronic engineers

5. CSS – Cascading style sheets

1.4 REFERENCES
• IEEE recommended practice for software requirement
specification IEEE STD 830-1993.
• KK Aggarwal

1.5 OVERVIEW
The rest of the SRS document describes the various
system requirements, interfaces, features & functionalities in
details.

2 OVERALL DESCRIPTIONS

4.1 PRODUCT PERSPECTIVE


The application will be self-contained.

Browser HTTP Server

2.1.1 SYSTEM INTERFACES


None

2.1.2 USER INTERFACES


The application will have a user-friendly and menu based
interfaces. Following things will be included:

• Bookmark managing
• Download managing
• Form managing
• Password managing
• Spell-checking
• Search engine toolbar
• Security configuration
• Privacy mode
• Auto-updater
• Pop-up blocking

• Full-text history search


• Tabbing navigation
• Page zooming
• Voice control
TOOLBAR:
 Address field
 Auto-fill form button
 Back button
 Refresh
 Home
 Favorites
 Close box
 Fonts

 Forward button
 History
 Security indicators
 Status bar
 Stop button
 Window title
 Search button
2.1.3 HARDWARE INTERFACES
1) A system needs min of 64MB RAM.
2) A LAN card for the internet
3) Modem
4) 52GHz Pentium processor
5) 233MB hard drive

2.1.4 SOFTWAE INTERFACES


1) Any Windows – based operating system(Windows
95/98/2000/XP/Vista)
2) Visual basic 6 – for coding/ developing the software.

2.1.5 COMMUNICATION INTERFACES


The Bowser should support the following internet protocols:
I. HTTP
II. E MAIL
III. FTP: File Transfer Protocol (FTP) is a network
protocol used to exchange and manipulate files over a
TCP computer network, such as the Internet. An FTP
client may connect to an FTP server to manipulate files
on that server.
IV. NNTP: The Network News Transfer Protocol or
NNTP is an Internet application protocol used
primarily for reading and posting Usenet articles (aka
netnews), as well as transferring news among news
servers
V. TLS: Transport Layer Security (TLS) and its
predecessor, Secure Sockets Layer (SSL), are
cryptographic protocols that provide security and data
integrity for communications over TCP/IP networks
such as the Internet.
VI. EV: Extended Validation Certificates (EV)[1] are a
special type of X.509 certificate which requires more
extensive investigation of the requesting entity[2] by the
Certificate Authority before being issued.
VII. GOPHER: Gopher is a distributed document search
and retrieval network protocol designed for the
Internet. Its goal is to function as an improved form of
Anonymous FTP, enhanced with hyper linking features
similar to those of the World Wide Web.
VIII. PROXY SERVER: In computer networks, a proxy
server is a server (a computer system or an application
program) that acts as a go-between for requests from
clients seeking resources from other servers.

Schematic representation of
a proxy server, where the
computer in the middle acts
as the proxy server between
the other two.

2.1.6 MEMORY CONSTRAINTS


At least 64 MB RAM and 233MB hard disk will be required
for running the browser.

2.1.7 OPERATIONS

2.1.8 SITE ADAPTATION REQUIREMENTS:


The terminals at client site will have to support the hardware
and software interfaces specified in the above sections.

2.2 PRODUCT FUNCTIONS


According to the customer use and needs the browser can
perform the following functions:
 Bookmark managing: Internet bookmarks are
stored Web page locations (URLs) that can be retrieved. As a
feature of all modern Internet web browsers, their primary
purpose is to easily catalog and access web pages that a user
has visited and chosen to save.
 Download managing: A download manager is
a computer program dedicated to the task
of downloading (and sometimes uploading)
possibly unrelated stand-alone files from (and
sometimes to) the Internet for storage.
 Password managing: It saves the
password the user provides on various
sites.
 Spell checker: In computing, a spell checker is
an application program that flags words in a document
that may not be spelled correctly. Spell checkers may
be stand-alone capable of operating on a block of text.
 Search Engine: Web search engine is a tool
designed to search for information on the World
Wide Web. The search results are usually
presented in a list and are commonly called hits.
The information may consist of web pages,
images, information and other types of files.
 Privacy mode: Privacy mode, also referred to
as "porn mode", is an informal term that refers
to privacy features in some web browsers.

TOOLBAR

Address field
This area is where the URL (web page address) for the web page is
displayed or entered.
Auto fill Forms Button
When you encounter a page that has a form on it, such as an order
page, this button will make filling out the form much easier.
Back Button
Use this button to go back to the previous page opened in this
particular browser window.
Bookmarks or Favorites
You can easily create a shortcut to your favorite web pages by using
the Bookmark (or Favorites) menu or button.
Close Box
This button in the upper right corner of the window will close the
browser window.

Fonts or Larger or Smaller


In Internet Explorer a button called Fonts gives you a menu to choose
the size of the text displayed in the browser window..
Forward Button
Like the Back button, the Forward button takes you to pages that you
have previously seen in a particular browser window.
History Button
Most browsers offers a History button or menu item which allows you
to look at the last several hundred web pages you've been to, and
select one of them for an easy return path.
Home Button
This button takes you to the page that has been designated as your
"home" page. You can select your "home page" in the browser's
Preferences (or Internet Options) section.
Favorites, Links or Personal Toolbar
You can add your own buttons to this toolbar
Maximize Button
In Windows you can use this button to make the browser's window
enlarge to full screen.
Menu bar
In Windows the Menu bar is a part of each browser window. Choices
include File, Edit, View, History, Favorites or Bookmarks and Help.
On the Macintosh, these Menus are always at the top of the screen.
Minimize Button
In Windows you can use this button to make the browser's window
disappear from the screen.
Print Button
You can print any web page by clicking this button.
Reload or Refresh Button
If you suspect the contents of a browser's window may have changed
since the last time you viewed it, you should click the Reload or
Refresh button to update the page.
Restore Button
If the browser's window is maximized you can use this button to
restore the size of the window so that it no longer fills the entire
screen. This is very useful if you want to see more than one
window at the same time
Search Button or Field
In some older browser there is a button to go to the page you have
designated as your "search" page.

Security Indicators
Most browsers show a padlock icon in the lower left corner of the
window to indicate a secure connection. This means that data being
sent or received from that server is encrypted and would be extremely
difficulty for a third party to access.
Status Bar
The bar along the bottom of the browser's window shows you what is
being loaded into the browser window at the moment or the URL of
the link your mouse is over
Use this button if you want to stop loading the contents of a page.
Window Title
The title of the web page appears in the browser window's title.
Sometimes pages don't have titles. When you bookmark a page, the
window's title is used to identify the bookmark

2.3 USER CHARACTERISTICS


• Education level: At least educated so that be able to
understand either of the the languages of the browser
(English, Hindi, Telugu).
• Technical expertise: Should be comfortable using general-
purpose applications on a computer.

2.4 CONSTRAINTS
• Monitor sizes and ratios, color or black-and-white monitors
render it virtually impossible to design pages that look good
on all device types.
• Font sizes and colors need to be alterable to fit the
requirements of sight-impaired viewers.
• The situation becomes more complicated when interactive
resizing of windows and frames, printing, or
communication conditions.

2.5 ASSUMPTIONS AND DEPENDENCIES


• Some pages display wrong with some browsers.
• Some web master along the way programmed in some
browser-specific codes.
• HTML and CSS should be syntactically same.

2.6 APPORTIONING OF REQUIREMENTS


The new features of the browser will be available in the future
version. It needs to be updated by the user.

3 SPECIFIC REQUIREMENTS
This section contains the software requirements to a level of
Detail sufficient to enable designers to design the system and the
Testers to test the system.

3.1 EXTERNAL INTERFACE REQUIREMENTS

3.1.1 USER INTERFACES


The following Window will be provided:
1) HOME PAGE: It directs the default page when the user starts
the browser.

BROWSER
TOOL BAR MENU

ADDRESS BAR MORE FUNCTIONS


2) PASSWORD BOX: It manages the password and other
information given by the user only if the user wants it to
save. Otherwise the request is rejected by the browser.

Do you want to remember the password on this site?


• Yes
• No
• Not now
• Never ask again

3) DOWNLOAD BOX: It shows current downloading on


the system.

Download box
Current downloading

Download rate

Clear list

Pause
Play

4) ERROR PAGE: The page displayed when the address is


not appropriate or the connection is not there.

The page cannot be displayed


The page you are looking for is currently unavailable. The Web site
might be experiencing technical difficulties, or you may need to adjust
your browser settings.

Please try the following:

• Click the Refresh button, or try again later.


• If you typed the page address in the Address bar, make sure
that it is spelled correctly.
• To check your connection settings, click the Tools menu, and
then click Internet Options. On the Connections tab, click
Settings. The settings should match those provided by your
local area network (LAN) administrator or Internet service
provider (ISP).
• See if your Internet connection settings are being detected. You
can set Microsoft Windows to examine your network and
automatically discover network connection settings (if your
network administrator has enabled this setting).
1. Click the Tools menu, and then click Internet
Options.
2. On the Connections tab, click LAN Settings.
3. Select Automatically detect settings, and then click
OK.
• Some sites require 128-bit connection security. Click the Help
menu and then click About Internet Explorer to determine
what strength security you have installed.
• If you are trying to reach a secure site, make sure your
Security settings can support it. Click the Tools menu, and
then click Internet Options. On the Advanced tab, scroll to
the Security section and check settings for SSL 2.0, SSL 3.0,
TLS 1.0, PCT 1.0.

• Click the Back button to try another link.

3.2 FUNCTIONS
It defines the fundamental actions that must take place in
the software in accepting and processing the inputs and generating the
outputs. The system shall …
VALIDITY CHECKS
• The address should be correct.
• Internet connection should be present.
• Presence of virus.
• Some sites are unable to be accessed due to security reasons.

RESPONSES TO ABNORMAL SITUATIONS


• Pop-up will be generated if any probability of virus is present.
• Error page generated when address is incorrect or other
relevant site is opened.
• Error page generated when internet connection is not detected.

3.3 PERFORMANCE REQUIREMENTS


Static numerical requirements are:
• HTTP should be supported.
• HTML should be supported.
• Any number of users can be supported.

Dynamic numerical requirements includes: the number of transactions


and tasks and the amount of data to be processed within certain time periods
for both normal and peak workload conditions depend upon the internet
connection and speed of the user.

3.4 LOGICAL DATABASE REQUIREMNETS


None

3.5 DESIGN CONSTRAINTS


None

3.6 SOFTWARE SYSTEM ATTRIBUTES


Quality attributes that can serve as requirements.

• Reliability: It supports the latest functions as per the user


requirements.
• Availability: It can be downloaded from the site.
• Security: It supports the privacy mode.
• Portability: It supports all operating system.
• Efficiency: Appropriate amount of computing resources and
code.

3.7 OTHER REQUIREMENTS


None

4 CHANGE MANAGEMENT PROCESS


Changes in project scope and requirements will be done if :
• Updation of the software
• Change in technology ( presence of any future OS )
• Change in user requirements

5 DOCUMENT APPROVAL
NA

6 SUPPORTING INFORMATION
The table of contents is given.
INDEX
1. INTRODUCTION
1.1 Purpose
1.2 Scope
1.3 Definitions, acronyms and abbreviations
1.4 References
1.5 Overview
2. OVERALL DESCRIPTION
2.1 Product perspective
2.1.1 System interfaces
2.1.2 Interfaces
2.1.3 Hardware interfaces
2.1.4 Software interfaces
2.1.5 Communication interfaces
2.1.6 Memory constraints
2.1.7 Operations
2.1.8 Site adaptation requirements
2.2 Product Functions
2.3 User characteristics
2.4 Constraints
2.5 Assumptions and dependencies
2.6 Apportioning of requirements
3. Specific Requirements
3.1 External interfaces
3.2 Functions
3.3 Performance requirements
3.4 Logical database requirements
3.5 Design constraints
3.6 Software system attributes
3.6.l Reliability
3.6.2 Availability
3.6.3 Security
3.6.4 Maintainability
3.6.4 Portability
3.6.5 Efficiency
3.7 Organizing the specific requirements
4. Change management process
5. Document approval
6. Supporting information
USE CASE DIAGRAM
0 LEVEL DATA FLOW DIAGRAM
.

USE CASE DIAGRAM

Das könnte Ihnen auch gefallen