Home Appliance Control System

Size: px
Start display at page:

Download "Home Appliance Control System"

Transcription

1 Home Appliance Control System Object-Oriented Analysis & Design Project Phase 1 CS 6359 Object-Oriented Analysis and Design Dr Lawrence Chung Summer 2005 Section 581 Group Members: Uttama Shakya: Pooja Mohan: Kelly Allison: Kiran Kapinjal: 1

2 Revision History Date Version Number Reason Author 06/11/05 Version 1.0 Primary requirements and analysis Team document 06/14/05 Version 1.1 Complete diagrams Team 06/15/05 Complete classes and CRC cards Team 2

3 Table of Contents CHAPTER 1 HACS OVERVIEW...1 i. Introduction...1 ii. Purpose and Scope CHAPTER 2 PROCESS ARCHITECTURE... 3 i. Organization...3 ii. Relationships and Team Work...5 iii. Meetings...5 CHAPTER 3 REQUIREMENTS SPECIFICATIONS...6 i. Functional Requirements...6 ii. Non-Functional Requirements...6 CHAPTER 4 USE CASE DIAGRAM AND DESCRIPTIONS...8 CHAPTER 5 INTERACTION DIAGRAMS AND DESCRIPTIONS...8 CHAPTER 6 CLASS DIAGRAM AND CRC CARDS REFERENCES

4

5 Figures Figure 1. Depict the overall system...2 Figure 2. A summary of each team member s responsibilities...4 Figure 3. Use Case Diagram of HACS...8 Figure 4. Use Case Sequence Diagram: Authenticate User...10 Figure 5. Use Case Collaboration Diagram: Authenticate User...10 Figure 6. Use Case Sequence Diagram: View and monitor status of devices...11 Figure 7. Use Case Collaboration Diagram: View and monitor status of devices...11 Figure 8. Use Case Sequence Diagram: Set AC Options...13 Figure 9. Use Case Collaboration Diagram: Set AC Options...14 Figure 10. Use Case Sequence Diagram: Set Microwave Options...15 Figure 11. Use Case Collaboration Diagram: Set Microwave Options...16 Figure 12. Use Case Sequence Diagram: Set Security System...17 Figure 13. Use Case Collaboration Diagram: Set Security Systems...18 Figure 14. Use Case Sequence Diagram: Configure Devices...21 Figure 15 Collaboration Diagram: Configure Appliances

6

7 Chapter 1 HACS Overview i. Introduction It s morning and rush hour traffic. You are in your car on your way to work; perhaps almost there. Something doesn t feel right. You start doubting your actions. Did you turn off the iron? What about the stove? Did you close the garage door? You are so unsure that you simply must turn around, go home and check. Sure enough, it s a good thing you went back. You left a burner on the stove on, but now you ll be late for that meeting. Wouldn t it be convenient if you could call your home and request that it check for you rather than wasting your time driving back. When you arrive at work, you could connect through the internet to display results of your query and other system status. You ve been away from home for a few days. You turned down the heat and turned off most of the lights before you left home. You are returning to a cold and dark home. Wouldn t it be nice to call home with the instructions to turn the heat to a warm and cozy degree and light those dark rooms for safety and convenience? How about a refrigerator that s you when the kids drink the last of the milk or juice? You could pick some up on the way home from work. How about a microwave that knows how and when to heat your meal and then keeps it warm until you get home? May we suggest to you the new home local network for the digital home which links appliances to a central control system and allows those appliances to communicate between themselves. This network allows you complete control at home and away from home through your phone/palm-top or over the internet for a convenient and comfortable living environment. No more nagging doubts with the home appliance control system (HACS). Just phone home or log in to your system over the net and ask it those questions or give it those commands and keep it programmed for maximum comfort, safety and efficiency 24 / 7. 1

8 Microwave Remote Interface HAVC Security Login/Out Monitor and Control Subsystem Messages Security Alarms Lights and Doors Figure 1. Depict the overall system. ii. Purpose and Scope The purpose of this document is to provide an analysis and design of a portion of the HACS system. Here we will examine the central controller and three appliances: the microwave, air heating and cooling system, and the security system as it pertains to lights, doors, and alarms. Class- Responsibility-Collaborator (CRC) cards are used as an aid to establish class responsibilities and collaborators during analysis to identify interactions among objects / classes during group brainstorming sessions (sequence diagrams for groups). Furthermore, this document will include use case diagrams, class diagrams and interaction diagrams (both sequence diagrams and collaboration diagrams). The functional model shall be depicted by use cases. These diagrams shall include use cases, actors and their relationships important in organizing and modeling the behaviors of the system. The analysis object model (the concepts visual to the user) shall be depicted with class diagrams. These diagrams depict the static design of the system using classes, interfaces, collaborations and their relationships. The dynamic model which focuses on the behavior / interaction of the system shall be depicted with sequence and collaboration diagrams. These diagrams show an interaction between objects and the relationship including messages dispatched among them. The sequence diagram is 2

9 an interaction diagram that emphasizes the time-ordering of messages. A collaboration diagram is an interaction diagram that emphasizes the structural organization of the objects that send and receive messages. It will also briefly address the requirements which define the key features of the HACS system. These requirements will then be used as a means to communicate the understanding of the HACS system. There will also be a section in this document providing the basis of the software and hardware design and will later be used to ensure that the final product is implemented as specified by the requirements set herein. In general, this document will only be used to provide information for a portion of the HACS system. The entire implementation and design of the HACS system will be outside of the scope of this document. Moreover, the team architecture and each member s role in creating the HACS system will be discussed in this document. This will describe how the team members were divided up in carrying out the design tasks and why each person was assigned that role. Chapter 2 Process Architecture i. Organization Our team has been divided into four groups, since there are four members in our team. The roles are as follows: - The analyst is the application domain expert responsible for detailing use cases. - The architect unifies the use cases from a system point of view. - The document editor is responsible for low-level integration of and overall format of the document. - The configuration manager is responsible for revision history. - The reviewer validates correctness. 3

10 Team Member Responsibility Description Uttama Shakya Project Management Project Analysis Project Specifications System Analysis Diagrams Review Systems Development Initial document editor Kelly Allison Class diagrams Review Pooja Mohan Systems Development Second document editor Describe diagrams Review Figure 2. A summary of each team member s responsibilities. 4

11 ii. Relationships and Team Work We have maintained a professional relationship throughout the course of the project. There is also a great team effort to get the project completed. Then again, we have held brainstorming sessions to come up with various ideas to reach the most desirable solution. Everyone has willingly helped each other out when additional help is needed. Because there were only four people on the team, we were able to work more closely with each other and it was much easier to communicate to one another if any changes needed to be made. Many times, we would work independently on our individual tasks. Once our task has been completed, then we would get together to integrate the solution. Most of our communications were exchanged via the yahoo group It is easier to communicate this way, since we would be able to post any concerns or questions and the other person would respond when they got a chance. We found this to be the most convenient way to communicate and, it has worked well with the size of our team. iii. Meetings Meetings are usually held on weekends or before class, since it was the best time for everyone to meet. These meetings were used to discuss the status of the project and for resolving any issues that may arise. 5

12 Chapter 3 Requirements Specifications i. Functional Requirements The purpose of the HACS system is to accept the user s input to control, monitor, and coordinate home appliances. It must address the following system requirements. System Requirements The heart of the home network is the control system written using J2EE. The central control system (CCS) shall provide secure login to the system. Users are identified with a username and password. It shall accept instructions locally or remotely and communicate those instructions to the appropriate devices within the home. Devices / appliances within the network shall have the capability to communicate between themselves as necessary and coordinate their process activity. It shall allow the user to activate and deactivate the system. It shall allow the system to start, stop and display current status without interfering with normal operations of the devices. It shall allow the user to add or remove, modify the behavior of and view the status of devices. It shall control, monitor, and coordinate appliances as programmed. It shall be adaptable. Detects events that change the environment and respond. It shall encapsulate lower-level functions to allow algorithms to vary independently. It shall accept information from the appliances, decisions made and appropriate messages generated based upon the decistion (i.e. alarms, dial 911). ii. Non-Functional Requirements Portability The system should be able to work on any machine with Java Virtual Machine installed. Reliability 6

13 The system should be able to handle multiple requests without failure. It should be able to detect and handle faults within a given time frame. The system should be available 99.9 percent of the time. User friendliness The system should be usable by non-experts, in which the user can learn to operate, prepare inputs for and interpret outputs of a system component. Flexibility The system should be automatically and manually adaptive and able to detect the various settings and accommodate to the changes accordingly, real-time. Performance The elapsed time between the submission of a request and the computation time should be minimal. Supportability The system should be able to handle new changes to the system including upgrades or changes to the existing system. It should b easily modified to accommodate enhancements and repairs. 7

14 Chapter 4 Use Case Diagram and Descriptions View and Monitor Status of Devices Set AC Options <<uses>> <<uses>> Set Microwave Options <<uses>> Home Owner <<uses>> Set Intrusion System <<uses>> <<uses>> Set Fire Alarm Options Authenticate User Every use case has to use the authentication process Technical Support Technical Support for HACS Configure Devices <<uses>> <<uses>> Configure Users Perform Diagnostics Figure 3. Use Case Diagram of HACS Chapter 5 Interaction Diagrams and Descriptions 8

15 . Use Case Name: Authenticate User Flow of events: Precondition: Each user has a unique username and a password to logon to HACS. Main Flow: 1. The user enters the username and password on the remote device. The remote access system contacts the HACS system to login. 2. The HACS system verifies the username and password. 3. On verifying the user information, the HACS system authenticates the user and displays the system information. Exceptional flow: 3. On failure to login, the system displays the login prompt again. This step is repeated maximum of three times. 4. On failure to provide correct username and password, the system locks up for a pre-set length of time. Post condition: On validation, the trusted user is given access to the HACS system. a. Sequence Diagram: Authenticate User Remote Access sytem is the medium through which the user contacts HACS. e.g. phone, computer, PDA, etc. : Home Owner : Remote Access System : HACS : Authentication Process 1: login(username, password) 2: login(username, password) 5: Display System Information 3: Success 4: verify(username, password) Every user registered in the system must have a valid username and password to enter the HACS system. 9

16 Figure 4. Use Case Sequence Diagram: Authenticate User b. Collaboration Diagram: Authenticate User 1: login(username, password) : Home Owner : Remote Access System 2: login(username, password) 5: displaysysteminformation() : HACS 4: success 3: verify(username, password) HACS uses Authentication Process to validate the user. : Authentication Process Figure 5. Use Case Collaboration Diagram: Authenticate User. Use Case Name: View and Monitor Status of devices Flow of events: Precondition: The user is logged on to the HACS system. Main Flow: 1. When the user wishes to view the status of individual devices, he chooses View Status option from the menu tab. 2. HACS retrieves the current status of appliances. 3. HACS will display the status of all configured appliances on user s request. Exceptional flow: If no appliance is registered in the system, the system shows the appropriate result. Post condition: The user can view the information on the current status of all the appliances. c. Sequence Diagram: View and Monitor status of devices 10

17 : Home Owner 1: viewstatus() : Remote Access System : HACS retrievestatus() retrieves the latest status HACS has received from each of the appliances in... 2: viewstatus() 3: retrievestatus() 4: status info Figure 6. Use Case Sequence Diagram: View and monitor status of devices d. Collaboration Diagram: View and monitor status of devices 4: retrievestatus() : Home Owner 1: viewstatus() : Remote Access System 2: viewstatus() 3: status info : HACS HACS retrieves the latest information on all appliances. Figure 7. Use Case Collaboration Diagram: View and monitor status of devices. Use Case Name: Set AC Options Flow of events: Precondition: The user is logged into the HACS system. Main Flow: 11

18 1. The user chooses to set AC options makes a request to the HACS system via the Remote Access System. 2. The HACS system retrieves and shows available options to adjust the AC system. 3. The user chooses to turn ON the AC from the options. 4. The HACS sends the message to the AC turning it ON. 5. Air Conditioner sends the updated status information to the HACS 6. The HACS displays the updated status on the remote device. Alternative flow: 3. The user chooses to adjust the temperature of AC. 4. The user enters the new temperature value on the remote access system. 5. The new temperature value request is sent to the HACS, which invokes new temperature settings on the AC. 6. The AC sets the temperature and sends updated status information to the HACS. 7. The HACS displays the updated status information on the remote device. Exceptional flow: The user enters temperature value which is out of preset range. HACS displays an error message and prompts the user to re-enter the temperature value. Post condition: The room temperature is modified. e. Sequence Diagram: Set AC Options 12

19 : Remote Access System : HACS : Air Conditioner : Home Owner 1: setacoptions() 2: setacoptions() opt [Opt = Power] User may choose any available options. In this case, may be turn on/ off AC or Adjust Temperature 5: turnon/offac(status) 4: displayavailableoptions() 6: turnon/offac(status) 3: getavailableoptions() 7: turnon/offac(status) 9: Updated Status 8: Updated Status opt [Opt = temperature] 10: AdjustTemp(temperature) 11: AdjustTemp(temperature) 12: AdjustTemp(temperature) 14: Updated Status 13: Updated Status Figure 8. Use Case Sequence Diagram: Set AC Options 13

20 f. Collaboration Diagram: Set AC Options 9: getavailableoptions() : Home Owner 1: setacoptions() 4: turnon/offac(status) : Remote Access System 2: setacoptions() 5: turnon/offac(status) 3: displayavailableoptions() 8: updated status : HACS This is the collaboration diagram of the system when the user chooses to turn on/off AC 7: updated status : Air Conditioner 6: turnon/offac(status) Figure 9. Use Case Collaboration Diagram: Set AC Options. Use Case Name: Set Microwave Options Flow of events: Precondition: The user is logged into the HACS system. Main Flow: 1. The user chooses to set microwave options via the Remote Access System. 2. The HACS system retrieves available microwave options and displays the available options. 3. The user chooses the option to turn ON the microwave. 4. The HACS sends the message to the microwave turning it ON. 5. Microwave sends the updated status information to the HACS 6. The HACS displays the updated status on the remote device. Alternative flow: 3. The user chooses the option to set the heating parameters like temperature, power and time. 4. The user enters the new heating parameter on the remote access system and submits the information. 5. The new settings request is sent to the HACS, which invokes changes on the microwave. 6. The microwave sends updated status information to the HACS. 7. The HACS displays the updated status information on the remote device. Exceptional flow: The user enters wrong values for the heating parameters. HACS displays an error message and prompts the user to re-enter the parameter value. Post condition: On validation, the new microwave settings are set. g. Sequence Diagram: Set Microwave Options 14

21 : Remote Access System : HACS : Microwave : Home Owner 1: setmicrowaveoptions() The user may choose to turn/off microwave or set heating parameters. 2: setmicrowaveoptions() 3: retriveavailableoptions() 4: displayavailableoptions() opt [Opt = Power] 5: TurnOn/Off(status) 6: TurnOn/Off(status) 7: TurnOn/Off(status) 8: Updated Status 9: Updated Status opt [Opt = Heating Parameters] 10: SetHeatingParameters(temperature, power, time) 11: SetHeatingParameters(temperature, power, time) 12: SetHeatingParameters(temperature, power, time) 14: Updated Status 13: Updated Status Figure 10. Use Case Sequence Diagram: Set Microwave Options 15

22 h. Collaboration Diagram: Set Microwave Options 3: retrieveavailableoptions() 1: setmicrowaveoptions() 5: turnon/off(status) : Home Owner : Remote Access System 2: setmicrowaveoptions() 6: turnon/off(status) 4: displayavailableoptions() 9: updated status : HACS This diagram shows the scenario of turning on/off microwave. 8: updated status : Microwave 7: turnon/off(status) Figure 11. Use Case Collaboration Diagram: Set Microwave Options. Use Case Name: Set Security System Flow of events: Precondition: The user is logged in to the HACS System. Main Flow: 1. The user chooses to set the security options. 2. The HACS system retrieves the available security options and displays them to the user. 3. The user chooses to set the fire alarm settings. 4. The user sets the threshold temperature value and forwards the request to the HACS. 5. The HACS system triggers the necessary action on the Home Security system. 6. The Home Security System sends the updated status to the HACS. 7. The HACS displays the updated status on the remote access device. Alternative flow: 3. The user chooses to change the intrusion alarm options. 4. The user chooses new settings for the intrusion alarm system and submits the information. 5. The HACS system triggers the necessary action on the Home Security system. 6. The Home Security System sends the updated status to the HACS. 7. The HACS displays the updated status on the remote access device. Exceptional flow: None Post condition: On validation, the changes are applied to the home security system. i. Sequence Diagram: Set Security System 16

23 : Remote Access System : HACS : Home Security System : Home Owner 1: setsecurityoptions() 2: setsecurityoptions() 3: retrieveavailableoptions() 4: displayavailableoptions() 5: SetFireAlarmOptions (Threshold Temperature) 6: SetFireAlarmOptions(Threshold Temperature) 7: AdjustFireAlarmSettings() The diagram shows only the scenario where the user chooses to set fire alarm options. Setting intrusion alarm system is not shown in the diagram. 9: Updated Status 8: Updated Status Figure 12. Use Case Sequence Diagram: Set Security System j. Collaboration Diagram: Set Security System 17

24 : Home Owner 1: setsecurityoptions() 5: SetFireAlarmOptions (Threshold Temperature) : Remote Access System 4: displayavailableoptions() 9: Updated Status 2: setsecurityoptions() 6: SetFireAlarmOptions(Threshold Temperature) : Home Security System 8: Updated Status 7: AdjustFireAlarmSettings() : HACS 3: retrieveavailableoptions() Retrieving available options imply to getting the available options for user to choose from to set the security system. In our system, fire alarm system and intrusion detection system are included in Home security System. Figure 13. Use Case Collaboration Diagram: Set Security Systems. Use Case Name: Configure Appliances Flow of events: Precondition: The user is logged on to the HACS. Main Flow: 1. The user chooses configure appliances options from the main menu. 2. The system checks the user privilege and displays the options to add, remove or modify the appliances. 3. The user chooses to add a new appliance. 4. The system presents the form to enter information on new appliance. 5. The user sends the new appliance information including the appliance name, the room in which the user has configured the appliance, preset settings for the appliance to the HACS. 6. The HACS verifies the appliance settings, adds the new appliance to the system and informs the user about successful addition of the appliance. Alternate flow: o A. Removing the appliance from the system. 3. The user chooses to remove the existing appliance. 4. The system displays a list of existing appliances in the system. 5. The user chooses the appliance to be removed from the list. 6. The system removes the chosen appliance from the system and informs the user. o B. Modifying the appliance in the system. 3. The user chooses to modify the existing appliance. 4. The system displays a list of existing appliances in the system. 5. The user chooses the appliance to be modified from the list. 6. The system displays a form with appliance information to be edited 7. The user modifies the appliance information and submits the information. 18

25 8. The system saves the modified information in the system and informs the user. Exceptional flow: If the user is not authorized to add/remove/modify appliances, HACS will generate an error message and deny any changes. Post condition: On validation, the new device is added or the information on existing device is modified or removed from the HACS system. k. Sequence Diagram: Configure Appliances 19

26 : Remote Access System : HACS : Appliance : Home Owner 1: configureappliances() The user may choose to add new appliance, remove appliance and modify appliance (not shown in the diagram) 2: configureappliances() 3: checkuserprivilege() opt [Opt = Add] 5: addnewappliance() 4: displayconfigureoptions() 6: addnewappliance() 7: getnewapplianceinfo() 8: setnewapplianceinfo() 9: setnewapplianceinfo() 10: verifynewapplianceinfo() 11: addnewappliance() 13: success 12: create() opt [Opt = Remove] 14: removeexistingappliance() 15: removeexistingappliance() 16: displayexistingappliances() 17: displayexistingappliances() 18: removeexistingappliance(appliance ID) 19: removeexistingdevice(appliance ID) 20: destroy() 21: success 20

27 Figure 14. Use Case Sequence Diagram: Configure Devices l. Collaboration Diagram: Configure Appliances : Home Owner 1: configureappliances() 5: addnewappliance() 7: setnewappliancesinfo() : Remote Access System This diagram shows the collaboration of the scenario in which the user chooses to add new appliance to the system. 4: displayconfigurationoptions() 2: configureappliances() 6: addnewappliance() 8: setnewappliancesinfo() 3: checkuserprivilege() 9: addnewappliance() : Appliance : HACS 10: create() Figure 15 Collaboration Diagram: Configure Appliances Note: Collaboration diagrams for removing and modifying the appliances are not shown due to time constraints. Sequence diagram does not include modifying the appliance information due to the same reason.. Use Case Name: Configure Users Add/modify/delete Flow of events: Precondition: The user with administrator privileges logs on to the HACS system. Main Flow: 1. The user chooses to configure users. 2. The system checks for user privileges to configure users. On verifying the privileges, the system retrieves available options add user, modify user and remove user - and displays it to the user. 3. The user chooses to add a new user. 4. The system presents a form for the user to enter the new user information. 5. The user enters new user information and submits it to the system. 6. HACS will add the new user to the system and informs the user. Alternative flow: 21

28 3. The user chooses to remove an existing user account. 4. The HACS retrieves and presents a list of existing users. 5. The user chooses a user to be removed from the system. 6. HACS removes the user from the system. Exceptional flow: If the user is not authorized to add/remove users, HACS will generate an error message and deny any change. Post condition: On validation, the new user is added or an existing user is removed from the HACS system. m. Sequence Diagram: Configure Users 22

29 : Remote Access System : HACS : User : Home Owner 1: configureusers() The user may choose to add, modify or remove users. opt 2: configureusers() 4: displayconfigurationoptions() 3: verifyuserprivilege() Only users with administrative privileges may configure users. [Opt = Add] 5: addnewuser() 6: addnewuser() 8: setnewuserinfo() 7: getnewuserinfo() 9: setnewuserinfo() 10: verifynewuserinfo() 11: addnewuser() 12: create() 13: success opt [Opt = Remove] 14: removeexistinguser() 15: removeexistinguser() 16: displayexistingusers() 17: removeexistinguser(user ID) 18: removeexistinguser(user ID) 19: destroy() 20: success Figure 16. Use Case Sequence Diagram: Configure Users 23

30 n. Collaboration Diagram: Configure Users 1: addnewuser() 5: setnewuserinfo() : Remote Access System : Home Owner The diagram shows the scenario of adding a new user to the system. 4: getnewuserinfo() 9: success 2: addnewuser() 6: setnewuserinfo() 3: verifyuserprivilege() 7: addnewuser() : User : HACS 8: create() Figure 17. Use Case Collaboration Diagram: Configure Users. Use Case Name: Perform Diagnostics Flow of events: Precondition: Technician is logged on to HACS. There is a software related problem in the HACS system. Main Flow: 1. The technician enters the username and password on the remote device. 2. The technician chooses to check the status of appliances; He chooses View Status option from the menu tab. 3. HACS retrieves the current status of devices from the database 4. HACS will display the status of all configured devices on user s request. 5. The technician determines a fault in one of the devices. 6. If the problem is software related, the technician applies software patches to HACS, it there exists one for the particular problem. 7. The system shows the updated status of all the appliances in the system. Exceptional flow: If the patch does not solve the problem, the problem in the HACS system is not resolved. 24

31 Post condition: The software problem in HACS is resolved. o. Sequence Diagram: Perform Diagnostics : Technical Support : Remote Access System : HACS : Appliance 1: viewstatus() 2: viewstatus() 3: retrievestatus() 5: applysoftwarepatch() 4: displaystatus() This scenario assumes the problem in HACS is due to software bugs. 6: applysoftwarepatch() 7: testappliance() 8: updated status 9: updated status Figure 18. Use Case Sequence Diagram: Perform Diagnostics p. Collaboration Diagram: Perform Diagnostics 25

32 1: viewstatus() 5: applysoftwarepatch() : Remote Access System : Technical Support 4: displaystatus() 9: updated status 2: viewstatus() 6: applysoftwarepatch() : Appliance 8: updated status 7: testappliance() Refers to checking if the appliance is working right. : HACS 3: retrievestatus() Figure 19. Use Case Collaboration Diagram: Perform Diagnostics 26

33 Chapter 6 Class Diagram and CRC Cards Home Owner username password Technician username password Authentication Process privileges authenticateuser() 1 Remote Access System IP Address userinfo accessdevicetype submituserinput() Remote Access can be from PDA, laptop, phone, etc. User username password createuser() deleteuser() 0..* 1..* 1 1 HACS sessionkey date time displaysysteminfo() addnewuser() login() logout() viewstatus() retrievestatus() getavailableoptions() displayavailableopitions() setacoptions() setmicrowaveoptions() setsecurityoptions() setfirealarmoptions() displayexistingappliances() configureappliances() 1 1..* Appliance appliancetype 1 create() delete() Microwave powersettings times setheatingparameter() turnonoff() updatestatus() Air Conditioner tempsettings times turnonoffac() adjusttemp() updatestatus() Home Security System alarmsettings times adjustfirealaramsettings() adjustsecurityoptions() updatestatus() Figure 20. Class Diagram 27

34 User Responsibilities Collect input from User Forward input to HACS Display response to User Collaborators HACS homeowner and technician CRC card for User class (superclass for homeowner and Technician) Remote Access System Responsibilities Establish and maintain session Submit user input to HACS Collaborators HACS CRC card for Remote Access System class 28

35 HACS Responsibilities Verify user privileges for user requests Configure users and devices Forward user requests to appliance Coordinate system status requests Log and report problems and user activity Maintain session with remote systems Collaborators Remote Access System Authentication Process Appliance User CRC card for HACS class AuthenticationProcess Responsibilities Authenticate user session privilege Authenticate user action request privilege Collaborators HACS CRC card for AuthenticationProcess class 29

36 Appliance Responsibilities Monitor device. Report trouble Handle appliance requests Create and delete appliances Collaborators HACS configured appliances CRC card for Appliance class Microwave, Air Conditioner, Home Security System Responsibilities Report trouble Accept user setting change requests Perform diagnostic tests Perform any schedule / script activities Collaborators Appliance CRC card for Microwave, air conditioner and home security system class 30

37 References Bruegge, Bernd and Dutoit, Allen H. ed. Object-Oriented Software Engineering: Using UML, Patterns, and Java. New Jersey: Pearson Education, Inc., Garland, David and Shaw, Mary. Software Architecture: Perspectives on an Emerging Discipline. New Jersey: Prentice Hall, Booch, Rumbaugh, Jacobson. The Unified Modeling Language User Guide. Massachusetts: Addison Wesley,

Rogers Smart Home Monitoring QUICK START GUIDE ROG_6093_QST_GDE_EN.indd 1 9/22/12 8:29 AM

Rogers Smart Home Monitoring QUICK START GUIDE ROG_6093_QST_GDE_EN.indd 1 9/22/12 8:29 AM Rogers Smart Home Monitoring QUICK START GUIDE STAY CONNECTED TO YOUR HOME AND YOUR FAMILY. This Quick Start Guide is designed to help you get the most out of your new system right away and help ensure

More information

CS 3610: Software Engineering. Summer 2013. Software Requirements Specification Document. Project Title: Road Repair Tracking System

CS 3610: Software Engineering. Summer 2013. Software Requirements Specification Document. Project Title: Road Repair Tracking System CS 3610: Software Engineering Summer 2013 Software Requirements Specification Document Project Title: Road Repair Tracking System Team 7 Ryan Wooten Chris Wyland Due Date Tuesday 06/04/2013 Table of Contents

More information

Software Requirements Specification

Software Requirements Specification METU DEPARTMENT OF COMPUTER ENGINEERING Software Requirements Specification SNMP Agent & Network Simulator Mustafa İlhan Osman Tahsin Berktaş Mehmet Elgin Akpınar 05.12.2010 Table of Contents 1. Introduction...

More information

Vision Document Airline Reservation System

Vision Document Airline Reservation System Vision Document Airline Reservation System Submitted in partial fulfillment of the requirements of the degree of Master of Software Engineering Kaavya Kuppa CIS 895 MSE Project Department of Computing

More information

Configuring SQL Server Lock (Block) Monitoring With Sentry-go Quick & Plus! monitors

Configuring SQL Server Lock (Block) Monitoring With Sentry-go Quick & Plus! monitors Configuring SQL Server Lock (Block) Monitoring With Sentry-go Quick & Plus! monitors 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! To allow for secure concurrent

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

RUP Vision Document for the Home Appliance Control System: Defining Stakeholders, Goals, and COTS Components

RUP Vision Document for the Home Appliance Control System: Defining Stakeholders, Goals, and COTS Components RUP Vision Document for the Home Appliance Control System: Defining Stakeholders, Goals, and COTS Components Technical Report UTDCS-17-04 Lawrence Chung, Department of Computer Science UTD Kendra Cooper,

More information

OVERVIEW OF THE PROJECT...

OVERVIEW OF THE PROJECT... SYSTEMS ENGINEERING DESIGN PROJECT ENPM 643, Fall 2006 Instructor Authors ENPM643 Dr. M Austin Atul Mehta & Felipe Leite Fall 2006 TABLE OF CONTENTS Section Page 1 OVERVIEW OF THE PROJECT... 3 1.1 PURPOSE...

More information

Soft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc. http://www.4sightfax.com/

Soft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc. http://www.4sightfax.com/ 4-Sight FAX 7.5 Getting Started Soft Solutions, Inc. http://www.4sightfax.com/ Introduction Thank you for your interest in 4-Sight FAX version 7.5. This guide documents the general configuration for using

More information

High Level Design Distributed Network Traffic Controller

High Level Design Distributed Network Traffic Controller High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction

More information

CIS 544 Advanced Software Design and Development. Project Management System. Oreoluwa Alebiosu

CIS 544 Advanced Software Design and Development. Project Management System. Oreoluwa Alebiosu CIS 544 Advanced Software Design and Development Project Management System Oreoluwa Alebiosu Contents 1. Requirements... 4 1.1. Use Case Diagram... 4 1.2. Use Case s and Sequence Diagrams... 5 1.2.1. Login...

More information

Problem Statement. Jonathan Huang Aditya Devarakonda. Overview

Problem Statement. Jonathan Huang Aditya Devarakonda. Overview Jonathan Huang Aditya Devarakonda Problem Statement Overview Automated job schedulers have been extensively studied and implemented in large clusters and supercomputers. However, many of these clusters

More information

Design Report: Resource Management Software CS400 Senior Design I

Design Report: Resource Management Software CS400 Senior Design I Design Report: Resource Management Software CS400 Senior Design I Mark Briggs Paul Knell John Schluechtermann Jeremy Vechinski Electrical Engineering and Computer Science Department Milwaukee School of

More information

Standard: Event Monitoring

Standard: Event Monitoring Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information

More information

Active Directory Integration

Active Directory Integration January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Fleet Optimization with IBM Maximo for Transportation

Fleet Optimization with IBM Maximo for Transportation Efficiencies, savings and new opportunities for fleet Fleet Optimization with IBM Maximo for Transportation Highlights Integrates IBM Maximo for Transportation with IBM Fleet Optimization solutions Offers

More information

Clear Choice Communications. Digital Voice Services User Guide

Clear Choice Communications. Digital Voice Services User Guide Clear Choice Communications Digital Voice Services User Guide 2 P a g e * Feature Access Codes *62 Access Voicemail *72 Call Forwarding Always Activation *73 Call Forwarding Always Deactivation *90 Call

More information

Installation Manual v2.0.0

Installation Manual v2.0.0 Installation Manual v2.0.0 Contents ResponseLogic Install Guide v2.0.0 (Command Prompt Install)... 3 Requirements... 4 Installation Checklist:... 4 1. Download and Unzip files.... 4 2. Confirm you have

More information

User Guide for VMware Adapter for SAP LVM VERSION 1.2

User Guide for VMware Adapter for SAP LVM VERSION 1.2 User Guide for VMware Adapter for SAP LVM VERSION 1.2 Table of Contents Introduction to VMware Adapter for SAP LVM... 3 Product Description... 3 Executive Summary... 3 Target Audience... 3 Prerequisites...

More information

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...

More information

CentreWare for Microsoft Operations Manager. User Guide

CentreWare for Microsoft Operations Manager. User Guide CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information

More information

NovaBACKUP Storage Server User Manual NovaStor / April 2013

NovaBACKUP Storage Server User Manual NovaStor / April 2013 NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change

More information

<Company Name> ugather Event Management System Software Requirements Specification. Version 1.0

<Company Name> ugather Event Management System Software Requirements Specification. Version 1.0 ugather Event Management System Version 1.0 Revision History Date Version Description Author 18/Feb/09 1.0 Initial creation of SRS document Confidential Page 2 Table of Contents 1. Introduction

More information

Raytec Milestone Plug-in User Guide Raytec Ltd 2013

Raytec Milestone Plug-in User Guide Raytec Ltd 2013 Raytec Milestone Plug-in User Guide Raytec Ltd 2013 1 1 Contents 2 Introduction 3 System Requirements 4 Raytec Milestone Plug-in Installation Instructions 5 Using the Raytec Discovery Tool 6 Configuring

More information

Premium Digital Voice Solution. User Guide

Premium Digital Voice Solution. User Guide Premium Digital Voice Solution User Guide Table of Contents How to Log into Account Portal & Changing your Password 1 How to Download Toolbar 2 Utilizing Voice Mail 3 Feature Guide & How to Configure

More information

MicrosoftDynam ics GP 2015. TenantServices Installation and Adm inistration Guide

MicrosoftDynam ics GP 2015. TenantServices Installation and Adm inistration Guide MicrosoftDynam ics GP 2015 TenantServices Installation and Adm inistration Guide Copyright Copyright 2014 Microsoft Corporation. All rights reserved. Limitation of liability This document is provided as-is.

More information

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1 The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)

More information

Bookstore Inventory System Software Requirements Specification. Version 1.0

Bookstore Inventory System Software Requirements Specification. Version 1.0 Bookstore Inventory System Software Requirements Specification Version 1.0 Revision History Date Version Description Author 9 Oct 2010 0.1 Vision Document Initial Draft 10 Oct 2010 0.2 Vision Document

More information

Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan

Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan WWW.JOURNALOFCOMPUTING.ORG 85 New Quantitative Study for Dissertations Repository System Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan Abstract In the age of technology,

More information

SNMP Manager User s Manual

SNMP Manager User s Manual SNMP Manager User s Manual Table of Contents 1. Introduction...2 2. SNMP Manager Install, Quick Start and Uninstall...2 2.1. Software Installation...2 2.2. Software Quick Start...2 2.3. Software Uninstall...2

More information

Create your portal account, and connect to your medical records.

Create your portal account, and connect to your medical records. Create your portal account, and connect to your medical records. Follow these steps if you have not received an email invitation to register. Any questions, please email us at patientportal@raleighmedicalgroup.com

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

User Guide Part 7. Status Server

User Guide Part 7. Status Server User Guide Part 7 Contents 1 OVERVIEW... 3 1.1 About OPC UA... 3 1.2 Uses of Status... 3 1.3 Status as a Platform... 4 1.4 Communication Ports... 4 2 SUB SYSTEMS... 5 2.1 Data Model... 5 2.1.1 Data Model

More information

BizTalk Server 2006. Business Activity Monitoring. Microsoft Corporation Published: April 2005. Abstract

BizTalk Server 2006. Business Activity Monitoring. Microsoft Corporation Published: April 2005. Abstract BizTalk Server 2006 Business Activity Monitoring Microsoft Corporation Published: April 2005 Abstract This paper provides a detailed description of two new Business Activity Monitoring (BAM) features in

More information

FireSIGHT User Agent Configuration Guide

FireSIGHT User Agent Configuration Guide Version 2.2 August 20, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

Online Banking Upgrade FAQs

Online Banking Upgrade FAQs Frequently Asked Questions Why is Town & Country changing to a new online banking system? When will the change take place? What is different about the new online banking system? Do I have to re-register

More information

Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases. Use Case Diagram: Home Security System. Alarm System

Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases. Use Case Diagram: Home Security System. Alarm System Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases Use Case Diagram: Home Security System Alarm System Use Case #1: Issue Smoke Alarm Primary Actor: Smoke detector Goal in Context: Smoke detector detects

More information

3CX IP PBX with Twilio Elastic SIP Trunking Interconnection Guide

3CX IP PBX with Twilio Elastic SIP Trunking Interconnection Guide 3CX IP PBX with Twilio Elastic SIP Trunking Interconnection Guide Hello and welcome to our guide on how to set up a 3CX IP PBX for use with Twilio s Elastic SIP Trunking service. This guide covers the

More information

How To - Implement Clientless Single Sign On Authentication with Active Directory

How To - Implement Clientless Single Sign On Authentication with Active Directory How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:

More information

VERITAS NetBackup Vault 6.0

VERITAS NetBackup Vault 6.0 VERITAS NetBackup Vault 6.0 Operator s Guide for UNIX, Windows, and Linux N15282C September 2005 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the

More information

Designing Real-Time and Embedded Systems with the COMET/UML method

Designing Real-Time and Embedded Systems with the COMET/UML method By Hassan Gomaa, Department of Information and Software Engineering, George Mason University. Designing Real-Time and Embedded Systems with the COMET/UML method Most object-oriented analysis and design

More information

Use Case Diagram. Tom Polanski, Analex Corporation CSCI 6448 - Object-Oriented Analysis and Design (Spring 2001) Homework #3 Use Cases

Use Case Diagram. Tom Polanski, Analex Corporation CSCI 6448 - Object-Oriented Analysis and Design (Spring 2001) Homework #3 Use Cases Tom Polanski, Analex Corporation CSCI 6448 - Object-Oriented Analysis and Design (Spring 2001) Homework #3 Use Cases Use Case Diagram Homeowner Intruder Trigger Wireless Sensor Trigger Access Point Monitor

More information

Test Case 3 Active Directory Integration

Test Case 3 Active Directory Integration April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of

More information

SCATS SALES AND CUSTOMER TRACKING SYSTEM SOFTWARE REQUIREMENTS SPECIFICATION VERSION: FINAL 1.0

SCATS SALES AND CUSTOMER TRACKING SYSTEM SOFTWARE REQUIREMENTS SPECIFICATION VERSION: FINAL 1.0 SCATS SALES AND CUSTOMER TRACKING SYSTEM SOFTWARE REQUIREMENTS SPECIFICATION VERSION: FINAL 1.0 OCTOBER 28, 2001 REVISION CHART Version Primary Author(s) Description of Version Date Completed Draft Johnny

More information

Remote Terminal Service (RTS) User Guide (Version 2.1)

Remote Terminal Service (RTS) User Guide (Version 2.1) Remote Terminal Service (RTS) User Guide (Version 2.1) Page 1 Table of Content Content Page 1 Introduction 3 2 Prerequisite 3 3 Logon Corporate Network via Internet 4 4 Download and Install RTS Client

More information

Digital Voice Services User Guide

Digital Voice Services User Guide Digital Voice Services User Guide 2 P a g e * Feature Access Codes *11 Broadworks Anywhere (pulling call to alternate phone) *62 Access Voicemail *72 Call Forwarding Always Activation *73 Call Forwarding

More information

VMware vcenter Support Assistant 5.1.1

VMware vcenter Support Assistant 5.1.1 VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following

More information

Administrator s Guide

Administrator s Guide Attachment Save for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4 3. System

More information

Mobility Services Platform 3.1.1 Software Installation Guide

Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide 72E-100159-04 Revision D January 2008 2007 by Motorola, Inc. All rights reserved.

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Applying Use Cases to Microcontroller Code Development. Chris Gilbert Cypress Semiconductor

Applying Use Cases to Microcontroller Code Development. Chris Gilbert Cypress Semiconductor Applying Use Cases to Microcontroller Code Development Chris Gilbert Cypress Semiconductor Agenda Why Use Cases Microcontroller Project Development Use Cases Defined Use Cases Composition General Example

More information

Office Voice User Guide. User Guide

Office Voice User Guide. User Guide Office Voice User Guide User Guide Contents Anonymous Call Rejection 3 Call Block 3 Call Forward 4 Call Return 5 Call Waiting 5 Caller ID 6 Do Not Disturb 7 Find Me 7 Last Number Redial 8 Selective Call

More information

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010 Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active

More information

Internet Filtering Appliance. User s Guide VERSION 1.2

Internet Filtering Appliance. User s Guide VERSION 1.2 Internet Filtering Appliance User s Guide VERSION 1.2 User s Guide VERSION 1.2 InternetSafety.com, Inc 3979 South Main Street Suite 230 Acworth, GA 30101 Phone 678 384 5300 Fax 678 384 5299 1 Table of

More information

Modeling a Problem Scenario with UML

Modeling a Problem Scenario with UML 1 Table of Contents 1 Table of Contents... 1 2 Problem Statement... 1 3 Overview... 1 3.1 Background... 1 3.2 Overall Description... 1 4 Constraints... 2 5 Functional Specifications... 2 5.1 Student...

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

Monitor Print Popup for Mac. Product Manual. www.monitorbm.com

Monitor Print Popup for Mac. Product Manual. www.monitorbm.com Monitor Print Popup for Mac Product Manual www.monitorbm.com Monitor Print Popup for Mac Product Manual Copyright 2013 Monitor Business Machines Ltd The software contains proprietary information of Monitor

More information

Imaging License Server User Guide

Imaging License Server User Guide IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44

More information

Migration Strategies and Tools for the HP Print Server Appliance

Migration Strategies and Tools for the HP Print Server Appliance white paper HP Print Server Appliance 4250 July 2003 Migration Strategies and Tools for the HP Print Server Appliance (Web Jetadmin version 7.2 and above; PSA Firmware version 2.4.x and above) Overview

More information

Design & Implementation about Mining Enterprise EAM (Enterprise Asset Management) System

Design & Implementation about Mining Enterprise EAM (Enterprise Asset Management) System Design & Implementation about Mining Enterprise EAM (Enterprise Asset Management) System Wang Huan, Li Changliang, Wang Dianlong Anshan Iron and Steel Group Corporation Mining Industry Company Abstract:

More information

X Series Application Note 43:

X Series Application Note 43: X Series Application Note 43: Using the Remote Viewing & Web Pages of the X - Series & GR Series Recorders The Remote Viewing function of the X-Series and GR Series Recorders provide the user with the

More information

Digital Voice Services Residential User Guide

Digital Voice Services Residential User Guide Digital Voice Services Residential User Guide 2 P a g e * Feature Access Codes *11 Broadworks Anywhere (pulling call to alternate phone) *62 Access Voicemail *72 Call Forwarding Always Activation *73 Call

More information

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration

More information

EMC Documentum Repository Services for Microsoft SharePoint

EMC Documentum Repository Services for Microsoft SharePoint EMC Documentum Repository Services for Microsoft SharePoint Version 6.5 SP2 Installation Guide P/N 300 009 829 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Chapter 11: Integrationand System Testing

Chapter 11: Integrationand System Testing Object-Oriented Software Engineering Using UML, Patterns, and Java Chapter 11: Integrationand System Testing Integration Testing Strategy The entire system is viewed as a collection of subsystems (sets

More information

Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.

Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document. Privacy Policy This Privacy Policy explains what information Fundwave Pte Ltd and its related entities ("Fundwave") collect about you and why, what we do with that information, how we share it, and how

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

RemotelyAnywhere Getting Started Guide

RemotelyAnywhere Getting Started Guide April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...

More information

Remote Desktop Services User's Guide

Remote Desktop Services User's Guide Contents Remote Desktop Services Document Revision Control Revision Description Author DATE 1.0 Initial Release Karen M. Hess 3/24/2015 1.1 Added section for viewing mapped drives Karen M. Hess 4/15/2015

More information

Use Case Modeling. Software Development Life Cycle Training. Use Case Modeling. Set A: Requirements Analysis Part 3: Use Case Modeling

Use Case Modeling. Software Development Life Cycle Training. Use Case Modeling. Set A: Requirements Analysis Part 3: Use Case Modeling Software Development Life Cycle Training Set A: Requirements Analysis Part 3: Use Case Modeling Use Case Modeling There are several ways to capture and organize software system requirements. The first

More information

How To Set Up Chime For A Coworker On Windows 7.1.2 (Windows) With A Windows 7 (Windows 7) On A Windows 8.1 (Windows 8) With An Ipad (Windows).Net (Windows Xp

How To Set Up Chime For A Coworker On Windows 7.1.2 (Windows) With A Windows 7 (Windows 7) On A Windows 8.1 (Windows 8) With An Ipad (Windows).Net (Windows Xp INSTALLATION GUIDE July 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may

More information

Software Requirements Specification. Task Management System. for. Prepared by. Version 1.0. Group Name: Pink and Purple. Date:

Software Requirements Specification. Task Management System. for. Prepared by. Version 1.0. Group Name: Pink and Purple. Date: Software Requirements Specification for Task Management System Version 1.0 Prepared by Group Name: Pink and Purple Kathrynn Gonzalez 11387240 kathrynn.gonzalez@gmail.com Tina Roper 11380457 troper17@comcast.net

More information

Verizon Business National Unified Messaging Service Enhanced Service Guide

Verizon Business National Unified Messaging Service Enhanced Service Guide USER GUIDE Voice Verizon Business National Unified Messaging Service Enhanced Service Guide What Is Unified Messaging? Verizon Business National Unified Messaging Service is an interactive voicemail system

More information

Access Control and Audit Trail Software

Access Control and Audit Trail Software Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control

More information

Ready to get started? Click the button below to tell us which account number you currently have:

Ready to get started? Click the button below to tell us which account number you currently have: We re pleased to announce the launch of your new Energy Online Account. As part of an upgrade in our customer care and billing system, all customers will need to re-register in order to use our new online

More information

CYCLOPE let s talk productivity

CYCLOPE let s talk productivity Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution

More information

Trouble Shooting SiteManager to GateManager access

Trouble Shooting SiteManager to GateManager access Trouble Shooting SiteManager to GateManager access If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection issues, this document

More information

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4 Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory

More information

DESIGN REPORT FOR THE PROJECT INVENTORY CONTROL SYSTEM FOR CALCULATION AND ORDERING OF AVAILABLE AND PROCESSED RESOURCES

DESIGN REPORT FOR THE PROJECT INVENTORY CONTROL SYSTEM FOR CALCULATION AND ORDERING OF AVAILABLE AND PROCESSED RESOURCES DESIGN REPORT FOR THE PROJECT INVENTORY CONTROL SYSTEM FOR CALCULATION AND ORDERING OF AVAILABLE AND PROCESSED RESOURCES (November 12, 2012) GROUP 9 SIMANT PUROHIT AKSHAY THIRKATEH BARTLOMIEJ MICZEK ROBERT

More information

MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003

MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003 Contents Introduction... 1 Network Load Balancing... 2 Example Environment... 5 Microsoft Network Load Balancing (Configuration)... 6 Validating your NLB configuration... 13 MailMarshal Specific Configuration...

More information

Digital Telephone User Guide

Digital Telephone User Guide Digital Telephone User Guide 1 Proud to provide Conway s Electric, Water, Cable, Internet and Telephone services. Welcome to Conway Corporation Digital Telephone Service We take pride in providing superior

More information

Emerson Smart Firewall

Emerson Smart Firewall DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy

More information

TDDC88 Lab 2 Unified Modeling Language (UML)

TDDC88 Lab 2 Unified Modeling Language (UML) TDDC88 Lab 2 Unified Modeling Language (UML) Introduction What is UML? Unified Modeling Language (UML) is a collection of graphical notations, which are defined using a single meta-model. UML can be used

More information

Network Setup Instructions

Network Setup Instructions Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical

More information

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

Management Utilities Configuration for UAC Environments

Management Utilities Configuration for UAC Environments Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least

More information

Table of Contents INTRODUCTION... 5 ADMINISTRATION... 6 MANAGING ACD GROUPS... 8

Table of Contents INTRODUCTION... 5 ADMINISTRATION... 6 MANAGING ACD GROUPS... 8 WorldSmart ACD Help Table of Contents INTRODUCTION... 5 OVERVIEW... 5 WHO CAN CREATE AND MANAGE ACD... 5 ADMINISTRATION... 6 CREATING A NEW GROUP... 6 ASSIGN PHONE NUMBER... 7 MANAGING ACD GROUPS... 8

More information

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Best Practices for Log File Management (Compliance, Security, Troubleshooting) Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers

More information

STOCK MARKET INVESTMENT FANTASY LEAGUE

STOCK MARKET INVESTMENT FANTASY LEAGUE 16:332:567 - Software Engineering I STOCK MARKET INVESTMENT FANTASY LEAGUE REPORT 3 Group 6 Jia Ding Nikhila Lavu Pratyusha Nandamuri Vaishnavi Kakumani Zhiyue Wang Date of Submission: 12/14/2011 1 1.

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE

RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE Installation and Administration Guide RSM Web Client and RSM Web Gateway 17 August, 2004 Page 1 Copyright Notice 2004 Sony Corporation.

More information

Two Factor Authentication in SonicOS

Two Factor Authentication in SonicOS Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage

More information

[SCHEDULING SYSTEM] Team 3. Tom Frazier Scott Gregory Amanda Lee Mary Lessels Luis Rivera

[SCHEDULING SYSTEM] Team 3. Tom Frazier Scott Gregory Amanda Lee Mary Lessels Luis Rivera 2010 Team 3 Tom Frazier Scott Gregory Amanda Lee Mary Lessels Luis Rivera [SCHEDULING SYSTEM] This project will aid management in weekly scheduling activities and tasks for Barnes & Noble store 2831 located

More information