Page -1- Humans and Technology HaT TR96.03a (98.10.26)



Similar documents
Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases. Use Case Diagram: Home Security System. Alarm System

Use Case Diagram. Tom Polanski, Analex Corporation CSCI Object-Oriented Analysis and Design (Spring 2001) Homework #3 Use Cases

Security System Owner s Manual

FIRST ALERT INSTRUCTION MANUAL FOR FA 270 KEYPADS SECURITY SYSTEM

Using your LED Plus keypad

MONITOR ISM / AFx Multi-Tenant Security System User Guide V1.3

DC-8706K Auto Dial Alarm System

Quick Installation Guide LCD GSM ALARM SYSTEM LH

SECURITY SYSTEM MANUAL

securıty HOME home protection 101

SECURITY & MONITORING QUICK GUIDE

Security module CG2 User manual

Guarded community solutions Easy Series for villa and apartment projects

Destiny Destiny Owners Manual

SECURITY SYSTEM NOTES SPECIAL CODES. Security System Configuration

IDS. Users Guide to Keypad Functions S E C U R I T Y MANUAL NO B ISSUED AUG 2002 VERSION 1.18

SECURITY SYSTEM NOTES. Security System Configuration

Tk20 Network Infrastructure

Palos Verdes Estates Police Department 340 Palos Verdes Drive West, Palos Verdes Estates, CA (310)

Ademco Vista-20P/First Alert FA-168C Basic Commands

DESTINY 1/19/96 # A

Consumer Features. Reputed Security. Model MG-6060

New GSM Alarm System. User s Manual. Profile For a better understanding of this product, please read this user manual thoroughly before using it.

Emergency Dialer DIAL-ALERT MODEL: AD

FIRE ALARM SYSTEM RECORD OF COMPLETION

WIRELESS ALARM SYSTEM WITH TELEPHONE AUTO DIALER

SECURITY SYSTEM NOTES SPECIAL CODES AUXILIARY ARM / DISARM CODES ENTRY / EXIT DELAY TIMES ZONE DESCRIPTIONS

How To Control A Car Alarm On A Car With A Remote Control System

FIRE ALARM SYSTEM RECORD OF COMPLETION

GSM Alarm System User Manual

securıty HOME home protection 101

S I E R R A PRODUCT INFORMATION GUIDE FOR HOME SECURITY. SIERRA Page 1

Security System User's Guide

LYNX Touch Security System

System off. Easy Series Intrusion Control Panel Making security easy featuring wlsn* * wireless Local SecurityNetwork

SPECIAL CONTROL BUTTON FUNCTIONS

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI

Simon XTi Quick Operation Guide

System off. Easy Series Intrusion Control Panel Making security easy featuring RADION wireless peripherals

SPECIAL CODES AUXILIARY CODES SYSTEM NOTES

Users Guide to Keypad Functions

WIRELESS ALARM SYSTEM WITH TELEPHONE AUTO DIALER

P/N Rev D

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003)

Consumer Features. Reputed Security. Model MG-6060

Electronic Security. For Financial Institutions

Security Service de Services sécurité. Security Alarm Monitoring Protocol

LYNX Touch L5200 Series Security System

Security System. User Guide for the LED Command Center

SECURITY SYSTEM NOTES

LYNX Touch Security System

HARDWIRED CONTROL PANELS

OVERVIEW OF THE TELEGUARD HOME SECURITY SYSTEM

National Security Systems Inc (800) Security System User's Guide

How to Modernize Your School s Bells, Overhead Paging, and Mass Notification in Times of Austerity. August 25, 2011

Using Your. Security System. With LED Keypad S5030, S5031, S5032

Solution-16 Operators Manual ISSUE 1.60

Using Your. Security System With Icon Keypad S5020, S5021, S5022

Security Alarm Monitoring Protocol

Intelligent Alarm System

SECURITY SYSTEM NOTES

3 6HFXULW\6\VWHP 8VHU*XLGH K4333 9/99 AWAY BYPASS STAY ALARM FIRE ARMED OFF AWAY STAY READY MAX TEST BYPASS INSTANT CODE CHIME

astec Integrated Alarm System USER GUIDE

GUIDE GETTING STARTED IMPORTANT SUPPORT RESOURCES

Solution 880 Operators Manual ISSUE 1.10

SECURITY SYSTEM NOTES AREA LISTINGS SPECIAL CODES ENTRY / EXIT DELAY TIMES ARM / DISARM CODES ZONE DESCRIPTIONS

Wireless Home Security System Product Manual (Model #80355)

LYNX Touch L5210 Series Security System

SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS

STATUS POWER MONITOR ALARM SOS DISARM

LYNX Touch L7000 Series Security System

GC2 Panel User Guide

GSM Home Alarm System User Manual.

Serenity s Web & Mobile Remote Access Concept

MOBILE CALL GSM alarm system

Welcome to a whole new level of interactive home security

Document No Rev. D

SECURIT 800L+ CONTROL PANEL

IDS X-Series User Manual D Issued July 2012

Bright House Networks Home Security and Control. Peace of mind included. QUICK START GUIDE

NetworX NX-6V2. LED Keypad User Manual

Simon Security System. User Guide EUR Rev A August Part No: ZZZJHVHFXULW\FRP. Motion. Doors & Windows

SCORPION. micron security products

GSM ALARM SYSTEM USER MANUAL

Customer Care (800) Index. Arming Your System...page 1. Chime Feature...page 4. Access Codes...page 4. Setting the Time and Date...

Enhanced. Commercial Burglary Partitioned Security System with Scheduling. User Guide. K4970-1V3 4/09 Rev. B FA560 3 STAY 2 AWAY 1 OFF 5 TEST 9 CHIME

User s Guide. Security Systems D220

USER GUIDE SERIES 4250 AUDIO ALARM CONFIRMATION SYSTEM CONTROL UNIT

Complete Security One Powerful Solution. GV4 Series integrated security, fire and access control panels D7212GV4, D7412GV4, D9412GV4

User's Manual. For use with ProSYS 16, ProSYS 40, and ProSYS 128

EDA-Z5008 & Z5020. Radio Fire Alarm System. User Manual

Alarm User Awareness Class. National Burglar & Fire Alarm Association

2. W hy is Alarmfone different to a siren only alarm system?

tattletale User Guide Consumer unit version P a g e

WITURA CORPORATION SDN BHD

With mini cellular module Quick Installation Guide

TX GSM SMS Auto-dial Alarm System. Installation and User Manual

Access CONTROL. MANAGEMENT Software

Transcription:

Edmon Begoli, Lucent Technologies CSCI 6448 University of Colorado CATECS Homework 3 Submission Notes on homework: Dr. Anderson, Please not that I used Use Case templates provided by Alistair Cockburn on his use cases web site: www.usecases.org. Page -1- Humans and Technology HaT TR96.03a (98.10.26)

Use case diagrams: Notify of smoke Smoke Detection <<includes>> Smoke detector notifies Notify Stakeholders Stakeholders Notify of intrusion Motion detector Intrusion Detection <<includes>> notifies Notify Stakeholders Stakeholders Page -2- Humans and Technology HaT TR96.03a (98.10.26)

Disarms Owner Disarm Alarm system Sets perimeter up Owner Set Up perimeter Page -3- Humans and Technology HaT TR96.03a (98.10.26)

Exercise in Use case and Actors Hierarchy Detector Stakeholder Smoke Detector Motion Detector Proximal Remote Report Alarm Detection Alarm Detection Alarm Report Detector Smoke detection Motion Detection Page -4- Humans and Technology HaT TR96.03a (98.10.26)

Use Case: Smoke detection -------------------------------------------------- CHARACTERISTIC INFORMATION Goal in Context: To inform stakeholders of the fire in the house. Scope: Alarm system. Level: Primary task Preconditions: Alarm system is armed and active. Detector is working. Communication means are functioning. Success End : Stakeholder is informed. Failed End : Stakeholder are not informed of smoke. Fire destroys monitored property. Primary Actor: Smoke detector. Trigger: Detection of smoke. ---------------------------------------- MAIN SUCCESS SCENARIO <put here the steps of the scenario from trigger to goal delivery, and any cleanup after> 1. One of the smoke detector signals smoke presence. 2. System identifies smoke detector location by its comm. port. 3. System informs stakeholders via phone line and the a/v speaker. ---------------------- RELATED INFORMATION (optional) Priority: Top priority. Performance Target: Stakeholders should be notified within 5 seconds. Frequency: Rarely. Only in extreme cases of fire, or strong smoke concentration. Subordinate Use Cases: Notify Stakeholders Channel to primary actor: Simplex, one way, Electric wire. Secondary Actors: Stakeholders Authorities and Owners Channel to Secondary Actors: Phone line, Speaker ---------------------------- OPEN ISSUES (optional) 1. How the system will recognize that someone is cooking food that generates smoke. --------------------------- SCHEDULE Due Date: Version 1.0 release. Page -5- Humans and Technology HaT TR96.03a (98.10.26)

Table format: USE CASE # Goal in Context Scope & Level Preconditions Success End Failed End Primary, Secondary Actors Notify Stakeholders To notify all the stakeholders that are interested in home security. Alarm notification, dial-in system and data protocol, audio/visual means. Sub-function Alarm system is armed and active. Stakeholders are identified and their contact info is known. Communication means (phone lines and a/v equipment) are working. Stakeholders were notified. Notification has failed. Stakeholder Remote: Owners direct phone, Authorities phone answering system, Proximal: by standers (owners, neighbors,police) who can hear alarm signal. Invocation with alarm signal details by alarm system Trigger DESCRIPTION Step Action 1 Notification is invoked with alarm signal. 2 Remote stakeholders are notified by calling in with pre-recorded message. 3 Proximal stakeholders are notified with A/V signal. EXTENSIONS Step Branching Action SUB- VARIATIONS 2a 2b Phone line is busy. Notify alternate stakeholder answering system or phone. Branching Action Second line is paging service Notify alternate stakeholder with prerecorded numerical code sequence. RELATED Notify Stakeholders INFORMATION Priority: Top priority Performance System should initiate notifications within 1 second. Frequency Rarely, but every time that alarm situation is detected. Channels to actors Phone line, electric wiring to A/V notifier. OPEN ISSUES 1. What if owner does not have a working phone 2. What is fire has damaged wires. 3. How to differentiate alarm codes for paging purposes. Due Date Release 1.0...any other management Developers for module that notifies authorities should be bonded for integration testing. information... Superordinates Smoke detection, Intrusion detection Subordinates None Page -6- Humans and Technology HaT TR96.03a (98.10.26)

USE CASE # Goal in Context Scope & Level Preconditions Disarm Alarm System Quick, safe and straight forward disarming of the alarm system. Authentication and system disabling Primary Task Alarm system is armed and active. User knows disarming procedure and Remembers password. System is disarmed. Success End Failed End System goes off. Primary, House owner Secondary Actors Trigger Entry of numerical password sequence DESCRIPTION Step Action 1 User enters 4 digit password 2 System recognizes password and disarms. 3 User disables alarm system EXTENSIONS Step Branching Action 1a Timeout Timeout starts with first numerical entry to the system while it Is armed. Timeout lasts 15 seconds. If main system is not authenticated them timeout will notify system to go off. Timeout resets after expiration. SUB- VARIATIONS Branching Action RELATED Disarm alarm system INFORMATION Priority: High priority Performance Disarming process has to occur within 15 seconds. Frequency At least 3 times a day. Every time user leaves the house. Channels to actors Interactive LCP and display. OPEN ISSUES 1. Is 15 seconds enough for all environments, and should that be made variable. Due Date Release 1.0...any other N/A management information... Superordinates N/A Subordinates Timeout For simplicity I did not model this as a use case. Page -7- Humans and Technology HaT TR96.03a (98.10.26)

Use Case: Disarm Alarm System. Narative: User A has to go to grocery store. She leaves the house and arms the system. When she comes back she wants to have time to enter the house with groceries, drop them and quickly enter her 4 digit numerical password before the alarm goes off. She also wants to be given a chance to make a password mistake and re-enter the right one. She also does not like complicated long and alphanumeric passwords. However, she is afraid that someone can break in the house and break the simple password with multiple attempts. For that reason buffer time between entry to monitored premises and alarm activation should be short enough to allow user to get ready to enter password, maybe make a mistake or two, but to disallow numerous trials in order to break the password code through 4 digit combinations. Page -8- Humans and Technology HaT TR96.03a (98.10.26)

USE CASE # Goal in Context Scope & Level Preconditions Intrusion detection To inform stakeholders of intrusion into premises. Primary Task Alarm system is on and armed. Detector is working. Communication means are functioning. Stakeholders are informed. Success End Failed End Stakeholders are not informed of intrusion, and premises are compromised. Primary, Intrusion detector Secondary Actors Stakeholders Trigger Intrusion detector reports intrusion. DESCRIPTION Step Action 1 Motion sensor reports motion 2 Await 15 seconds to allow authentication of the motion 3 Receive timeout and report intrusion to stakeholders EXTENSIONS Step Branching Action SUB- VARIATIONS 1a Motion is authenticated Use case: Disarm Alarm system Branching Action RELATED Intrusion Detection INFORMATION Priority: Top priority Performance Detection instant, 15 seconds for positive intrusion identification Frequency Rarely, every time that intrusion occurs Channels to actors Electric wire, Phone lines, A/V OPEN ISSUES 1. Should 15 seconds buffer be disallowed for areas other then entrance. Due Date Release 1.0...any other N/A management information... Superordinates <optional, name of use case(s) that includes this one> Subordinates Notify Stakeholders, Timeout Page -9- Humans and Technology HaT TR96.03a (98.10.26)

USE CASE # Goal in Context Scope & Level Activate perimeter monitoring To have one part of the house monitored for alarm conditions, and other Part available for use. Alarm system, coverage area and system reaction. Sub-function System is disarmed. User is trained to use this feature. System is armed for the perimeter area while the rest of the house is available for use. Perimeter area is not set. System goes off. Preconditions Success End Failed End Primary, Owner of the house Secondary Actors Trigger Actor selects to set perimeter monitoring. DESCRIPTION Step Action 1 Actor selects to set perimeter area monitoring 2 Actor selects rooms to be monitored 3 Actor activates the system for monitoring, system activates EXTENSIONS Step Branching Action SUB- VARIATIONS 2a 2b Perimeter area is not selected, but system is activated. Notify the user that perimeter mode can be set without some rooms selected for exemption System is ready to be programmed for perimeter monitoring, but nothing is selected for monitoring. Timeout after 30 seconds and return to stand by state. Branching Action RELATED INFORMATION Priority: Performance Frequency Channels to actors OPEN ISSUES Intrusion detection Due Date Release 1.0...any other management information... Superordinates Subordinates This is optional feature available on more expensive models. Respond to user input immediately. Once a week to once a day. Interactive: buttons, LED, display Should this function be available from armed mode,so that owners Can selectively disarm alarm. Page -10- Humans and Technology HaT TR96.03a (98.10.26)