You are on page 1of 20


Bluetooth Area Network Messaging (BAN)


TABLE OF CONTENT 1. Introduction Purpose Of This Document Definitions, Acronyms And Abbreviation References 2. Overall description Product Functions User Classes And Characteristics
General Constraints, Assumptions, Dependencies, Guidelines

3. Requirements
Non Functional Requirements Functional Requirements Performance Requirements

4. System analysis Existing system Proposed system 5. Feasibility Study Economical Feasibility Technical Feasibility Behavioral Feasibility 6. Data flow diagram Process External Entity Data Flow Data Store 7. Database Design Table Structure

The requirement document is a combination of requirements definition and requirement specification. Introduction: Aim of the project is to create an application for sending the network messages from a pc using blue tooth device. Acronyms. Purpose of this Document: System requirements are expressed in a software requirement document. and Abbreviations DEFINITIONS . It should specify what the system should do without specifying how it should be done. This is official statement of what is required of the system developers.1. Definitions.1 2. The Overall Description: Bluetooth: .ACRONYMS AND ABBREVIATIONS AWT BAN SQL GUI Admin OS HTML HDD J2ME Abstract Window Tool Kit Bluetooth Area Network Messaging Structured query language Graphical user interface Administrator Operating system Hyper Text Markup Language Hard disk drive Java 2 Micro Edition Table 1.

PCs and peripherals. . they form what is referred to as a Piconet. Bluetooth technology is essentially a cable-replacement technology. where one device acts as a master while all others (up to seven) are slaves. in Figure 1 a piconet master node becomes a slave node for the other piconet. . Architecture: Bluetooth Devices and Network Bluetooth devices use a unique IEEE 802 48-bit address.Bluetooth technology is a global short-range wireless standard that allows a broad range of electronic devices to connect and communicate with each other. word and power point etc. and two connecting masters form an overlapping piconet that is referred to as a Scatternet. Bluetooth technology allows these devices to connect. Figure 1. it can also be used for restarting the pc. Slaves can participate in different piconets. moving the mouse and performing mouse click operations. The Bluetooth Piconet and Scatternet Networks. From mobile phones and headsets to MP3 players. Description: Bluetooth enabled mobile can be used as a remote device for controlling the pc for opening specific applications like notepad. When two or more Bluetooth devices connect. This is a dynamic (ad hoc) network.

Bluetooth supports one data channel and a maximum of three voice channels. They are . Data can be exchanged at a rate of approximately 720 kilobits per second using point-to-point or multipoint encrypted connections. The theoretical range of Bluetooth is 100 meters. The range for Sony Ericsson P900/P908 is approximately 10 meters. Working Diagram: The system is mainly divided into two sub system.

Assumptions.2 User Class and Characteristics Mainly. Windows application 2. Guidelines . the potential users will be of middle class and high class and the user interface should be interactive such that any user can get things easily. there are two classes of users. Employee Characteristics of the users that are going to use the system: Even the naïve users can use the proposed system and it does not require any educational level. experience. Dependencies.1. 2. 1. for the administrator or the network people to send the messages to the other users. 2. and technical expertise in computer field but it will be of good use if the user has the good knowledge of how to operate a computer. Mobile application Windows Application: This part of the system is mainly used in the server machine. This system mainly consists of a) User Management b) Bluetooth address management c) Message management d) Logon and log off activity Mobile Application: In this part it receives the message from the server and display to the user.3 General Constraints. Mainly. Administrator 2.

The database must be able to return answers quickly to the queries entered by users via the UI (no more than 5 seconds average wait time).1 Non Functional Requirements There are mainly two types of non-functional requirements.Front-end (user interaction)  The product will require a computer with it is installed. page serving)  The product will require a powerful database server capable of storing and querying large amounts of data (on the order of 10. Back-end (data storage. Requirements: 3.000 records). Requirements: Hardware Processor : P111 or above RAM : 128 or above HD : 20 GB or above CDROM FD Bluetooth Dongle Software Operating System Development Tools Programming Lang Technology : JAVA : SWING : Any . 3.

4. System Analysis: In the system analysis phase. Existing System 2.  There is a chance that the user is not sitting in front of the computer for a long period of time may lose a very important message .1.3 Performance Requirements The performance of the system should be up-to the common standard. Proposed System 4.2 Functional Requirements The system shall i) ii) iii) iv) v) Allow to add new categories. System study and analysis has mainly two parts.Back End Technology : SQL SERVER : J2ME Mobile Application Development 3. first we had to analysis the existing system thoroughly and understand the process and come to an outline of new system. They are: 1. Allow to add staff members Assign various staff to groups Setting a head for a group Sending messages Detecting Bluetooth devices vi) 3. Existing system  There are many software’s used for sending and receiving messages. But no software has created by emphasis both computer network and mobile network together.

Thus when a new project is proposed. 5. Feasibility Study Feasibility study is made to see if the project on completion will serve the purpose of the organization for the amount of work. The system can also be used for transferring files between the users.2 Proposed system The proposed system gives very good mechanism for sending and receiving the messages. • • • Economical Feasibility Technical Feasibility Behavioral Feasibility . Investigating the existing system in the area under investigation does. effort and the time that spend on it. social and economical feasibility of a syste3m and generating ideas about the new system. to test the technical.4. it normally goes through a feasibility study before it’s approved for development. There are three aspects in the feasibility study portion of the preliminary investigation. Feasibility study lets the developer foresee the future of the project and the usefulness. It also detect the Bluetooth of the mobile device or computer and send message. Feasibility study is a test of system proposed regarding its workability. ability to meet the needs and effective use of resources. economical and behavioral feasibilities. The document provide the feasibility of the project that is being designed and lists various areas that were considered very carefully during the feasibility study of this project such as technical. impact on the organization.

Then they must be tested for economic feasibility. the investigation must go on to suggest the type of equipment. Also all the resources are already available. 5. and if technically feasible their impact on the organization must be assessed. the system may still be used. One of the factors. the operational system can be devised. programs. The project is developed within latest technology. procedures and staff. Since the system developed as part of project work. of running the system once it has been designed. The project should be developed such that the necessary functions and performance are achieved within the constraints. Thus the project is behaviorally feasible. due to the fact that never version of some software supports older versions. return at the earliest. is the cost it would require. there is no manual cost to spend for the proposed system. it give an indication of the system is economically possible for development. the project is technically feasible for development. Criteria to ensure that effort is concentrated on project. All the behavioral aspects are considered carefully. Through the technology may become obsolete after some period of time. .The proposed system must be evaluated from a technical point of view first. which affect the development of a new system. Having identified an outline system. 5.3 Behavioral Feasibility The proposed project would be beneficial to any flat builders.2 Technical Feasibility The system must be evaluated from the technical point of view first. required method developing the system. The system has been developed using Visual C++. which will give best. 1 Economical Feasibility The developing system must be justified by cost and benefit. 5. output. If So there arte only minimal constraints involved with this project. The assessment of this feasibility must be based on an outline design of the system requirement in the terms of input.

Data flow diagram is a means of representing a system at any level of detail with a graphic network of symbols showing data flows. . The DFD is used to represent increasing information flow and functional details. Level 1 DFD. logical representations. 6. The diagrams are graphical. modeling what system does. A level 0 DFD also called a fundamental system model represents the entire software elements as single bible with input and output indicated by incoming outgoing arrows respectively. i. Any processes which are complex in level 1 will be further represented into sub functions in the next level. in level 2. This is the first technical representation of a system. Data Flow Diagram Analysis model helps us to understand that relationship between different components in the system design. Additional process and information flow parts are represented in the next level. To describe what the user requires. To establish a basis for creation of software design.Only by spending time to evaluate feasibility. showing systems at any level of details. do we reduce the chances for extreme embarrassment at later stage of a project. Analysis model shows the user clearly. To define a set of requirements that can be validated once the software is built. eliminating thousands of words. 3. Each of the processes represented at level 1 are sub functions of overall system depicted in the context model. hierarchical. allowing user understanding and reviewing.e. how a system will function. 2. i. A data flow diagram is a graphical technique that depicts information flow and transforms that are applied as data move from input to output. data processes and data sources.e. The purpose of data flow diagram is to provide a semantic bridge between users and system developers. This project passes this entire tests and thus feasible. data stores. and jargon less. The analysis modeling must achieve three primary objectives. 1.

Used to represent data flow : : Used to represent external entries Used to represent data store. The basic elements of DFD are Bubbles Arrows Rectangles Option box : : Used to represent functions.The goal of data flow diagram is to have a commonly understood model of a system. Process External Entity Data Flow Data Base PROCESS . data dictionaries and procedure representing techniques such as decision table. The diagram is the basis of structured system analysis. Data flow diagram are supported by other techniques of structured system analysis such as data structured diagrams. decision tree and structure English.

. Secondly.A process shows a transformation or manipulation of data flow within the system. allocation appears to the right of the identifier and describes where in the system the process takes place. It is represented by an open ended narrow rectangle. are represented on a business process diagram. or may be short-term accumulations: for example batches of documents that are waiting to be processed. The symbol used is a rectangular box. appears in the upper left hand corner. which contains 3 descriptive elements firstly an identification number. be a department or a piece of hardware. Data stores may be long-term file such as sales ledgers. a descriptive title is placed in the center of the box. which is outside the area of study. from that the system inputs come or to which the system outputs go. verbal or electronic. Finally. or by a description of its contents. Each data store should be given a reference followed by an arbitrary number. Each data flow may be referenced by the processes or data stores at its head and tail. This should be a simple imperative sentence with a specific verb. Usually this is an element. with arrowhead showing the direction of flow. Only those entities. information always flow to or from a process and may be written. for example ‘maintain customer records’ or find driver. The symbol used in an oval containing a meaningful and unique identifier. A data flow is represented by a line. which originate or receive data. EXTERNAL ENTITY An external entity is source of destination of data flow. for example. This is allocated arbitrarily at the top level and serves as a unique reference. DATA STORE Data store is a holding place for a information within the system. This may. DATA FLOW A data flow shows the flow of information from its source to its destination. A common example of external entity is person or a group of persons.

pwd 1 Check Login success Invalid / Retype Error message 2 Admin Operation s .Context Diagram User Request Response BAN User Username.password login Administrator request Un.

password Employee Uname. Edit unmae.jcat jcat Head Assign accept old password update edit tab_teacher Change passwor d update password login edit Uname. Edit jcatid update edit gid.pas Employee Check Login success re-request Invalid / Retype failure Employee .enter shift value s Staff Add.etc update edit employee Administrator Settings details teacher details Categor y Add.

The database must be normalized one. .mno Message details Message update edit Message profile euname Employee transfer details Modify Profile update edit FTno update edit Employee File Transfer old password visitor informations EFtransfer Change passwor d update edit Employee Visitor Prfile 7. It is a definition of the entire information content of the organization and it species a relationship between the data. A business object is nothing but information that is visible to the users of the system. Database design is one of the important parts in developing software. DATABASE DESIGN: seid. inexpensive and flexible to the user. Database design is used to define and then specify the structure of business used in the client/server system. The general objective of database design is to make the data access easy.etc Update Visitorprofile A database is a collection of interrelated data stored with minimum redundancy to serve many users quickly and efficiently. It minimizes the artificiality embedded in using separate files. It is a process of developing the conceptual model of data.

5NF—Break all tables to the smallest possible pieces to eliminate all redundancy within a table. DATA NORMALIZATION The entities along with their attributes can be stored in many different ways into a set of tables. Most designing try to reach and a few 4NF. The data structure can be later refined through a normalization process that groups data in the simplest way possible so that later changes can be made with ease. Normalization is designed to simplify relationships and establish logical links between files without losing information. This method of organizing the data table is known as Normalization.The primary objectives are fast response time to inquiries. Secondly. type of the fields. the analyst must decide the fields of the tables. 4NF— An entity cannot have a 1:1 relation between key columns and non-key columns. accuracy and integrity of the system. 3NF—No non-key columns can depend on another non-key column. It helps in. clarity and ease of use. The six Normalization rules are: 1NF— Each row or column must have a single value with no repeating values 2NF— Each non-key column must depend on the primary key column. Normalization implies splitting the tables to two or more tables with fewer columns. the entity and relationship must be identified. their attributes must be specified. more information at low cost. firstly. data and program independence. control of redundancy. . field length. privacy and security of information and availability of powerful end user languages. An inherent problem is data redundancy and the inefficiency it generates. In other words. The methods of arranging these attributes are called normal forms.but not many reach 5NF. For this. fast recovery. BCNF—No attribute of a composite key depend on the attribute of another composite key. For designing a table. The theory behind the arrangement of attributes into table is known as normalization theory. default values etc.

 Creates a row for each occurrence of a repeated field. The second normal form has the characteristics of the first normal form and all attributes must fully be dependent on the primary key. Every value in a relation each attribute value is atomic so far as system is concerned.  It reduces inconsistency of data.  First normal form. Table Name : admin Field Aname Apass Primary Key : Aname Data Type Varchar(20) Varchar(20) Description Admin name password 2.  Allows exploitation of column functions. Table Name : jcat Field Jcatid Jcatname Jsal Primary Key : Jcatid Data Type Integer Varchar(20) Float Description Category id Category name Salary . Minimization of duplication of data  Providing flexibility to support different functional requirements.  Enabling the model to be translated to database design. TABLE STRUCTURE 1. All relations in a relational database are required to satisfy the following condition. Advantages of normalization are:  Helps in reduction in the complexity of maintaining data integrity by removing the redundant data.  Eliminate the repeating fields.

Table Name : EmpGroup Field Data Type Gid Integer Euname Varchar(20) Primary Key : Gid & Euname Description Group id Uname 6. Table Name : EGroup Field Gid Gname Gheaduname Primary Key : Gid Data Type Integer Varchar(20) Varchar(30) Description Group id Name Head name 5.3. Table Name : Employee Field Euname Epass Ename Eadderss EPhoto Ejcatid EBaddressp EBaddressm Primary Key : Euname Data Type Varchar(30) Varchar(20) Varchar(30) Varchar(50) Varchar(300) Int Varchar(50) Varchar(50) Description Employee Name password Name Address Photo Employee cat Mob Bluetooth address Mach bluetooth address 4. Table Name : Message Field Mno MTtitle Data Type Integer Varchar(20) Description Message no Title .

Table Name : EFileTransfer Field EFtno EUname ETName Ttype Primary Key : EFTno Data Type Integer Varchar(20) Etoname Int Description File Transfer No From User name To user name (one/group) .Mcontent Mdate Mfuname Mtype Mtuname Mstat Primary Key : Mno Varchar(2000) Datetime Varchar(20) Integer Varchar(50) Varchar(50) Content Date time From user name Person/group To address Send/inbox/folder 7. Table Name : Visitor_Profile Field Vno EUnme Dtvisit Purpose Vname Vaddress Primary key: vno Data Type Integer Varchar(50) Datetime Varchar(50) Varcahr(20) Varchar(50) Description Visitor id User name Date and time of visiting Purpose Visitor name Visitior address 8.