DOC PREVIEW
WVU CS 430 - SOFTWARE REQUIREMENTS SPECIFICATION

This preview shows page 1-2-14-15-30-31 out of 31 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

SOFTWARE REQUIREMENTS SPECIFICATIONTable of Contents1 Introduction1.1 Goals and objectives1.2 Statement of scope1.3 Software context1.4 Major Constraints1.4.1 Hardware Limitations1.4.2 System Security2 Usage Scenarios2.1 Users2.2 Use-Case Diagram2.3 Special Usage Considerations3 Data Model and Description3.1 Data Description3.2 Data Objects3.2.1 Client3.2.2 Server3.2.3 Files3.3 Relationships3.4 Complete Data Model3.5 Data Dictionary3.5.1 GUI3.5.2 SFTP3.5.3 SSH3.5.4 TCP/IP4 Functional Model and Description4.1 Server Functions4.1.1 block()4.1.1.1 PSPEC4.1.1.2 Function Flow Diagram4.1.1.3 Interface Description4.1.1.4 Performance Issues4.1.1.5 Design Constraints4.1.1.6 Transforms4.1.2 disconnect()4.1.2.1 PSPEC4.1.2.2 Function Flow Diagram4.1.2.3 Interface Design4.1.2.4 Performance Issues4.1.2.5 Design Constraints4.1.2.6 Transforms4.1.3 listen()4.1.3.1 PSPEC4.1.3.2 Function Flow Diagram4.1.3.3 Interface Design4.1.3.4 Performance Issues4.1.3.5 Design Constraints4.1.3.6 Transforms4.2 User Functions4.2.1 knock()4.2.1.1 PSPEC4.2.1.2 Function Flow Diagram4.2.1.3 Interface Description4.2.1.4 Performance Issues4.2.1.5 Design Constraints4.2.1.6 Transforms4.2.2 login()4.2.2.1 PSPEC4.2.2.2 Function Flow Diagram4.2.2.3 Interface Description4.2.2.4 Performance Issues4.2.2.5 Design Constraints4.2.2.6 Transforms4.2.3 logout()4.2.3.1 PSPEC4.2.3.2 Function Flow Diagram4.2.3.3 Interface Description4.2.3.4 Performance Issues4.2.3.5 Design Constraints4.2.3.6 Transforms4.2.4 getFile()4.2.4.1 PSPEC4.2.4.2 Function Flow Diagram4.2.4.3 Interface Description4.2.4.4 Performance Issues4.2.4.5 Design Constraints4.2.4.6 Transforms4.2.5 sendFile()4.2.5.1 PSPEC4.2.5.2 Function Flow Diagram4.2.5.3 Interface Description4.2.5.4 Performance Issues4.2.5.5 Design Constraints4.2.5.6 Transforms4.3 Software Interface Description4.3.1 External Machine Interfaces4.3.2 External System Interfaces4.3.3 Human Interface5 Behavioral Model and Description5.1 Description of Software Behavior5.1.1 Events5.1.1.1 Authentication5.1.1.2 Knocking5.1.1.3 Timeout5.1.1.4 Transmission5.1.2 States5.1.2.1 Active5.1.2.2 Blocked5.1.2.3 Connected5.1.2.4 Disconnected5.2 State Transition Diagram5.3 CSPEC6 Restrictions, Limitations, and Constraints7 Validation Criteria7.1 Classes of Tests7.1.1 Client Testing7.1.2 Server Testing7.2 Software Response7.2.1 Client Testing7.2.2 Server Testing7.2.3 Performance Bounds8 Appendices8.1 System Traceability Matrix8.2 References8.2.1 SSH Protocol – RFC 42508.2.2 SSH Protocol – RFC 42518.2.3 SSH Protocol – RFC 42528.2.4 SSH Protocol – RFC 42538.2.5 SSH Protocol – RFC 4254SOFTWARE REQUIREMENTS SPECIFICATIONSecure TransferFebruary 14, 2008Version 1.0Alex BakerMatt BartenschlagSue MorrisYin XuSoftware Requirements Specification - Version 1.0 - 1Table of ContentsSOFTWARE REQUIREMENTS SPECIFICATION..............................................1Table of Contents................................................................................................21 Introduction.................................................................................................51.1 Goals and objectives............................................................................51.2 Statement of scope...............................................................................51.3 Software context..................................................................................51.4 Major Constraints................................................................................61.4.1 Hardware Limitations.......................................................................61.4.2 System Security................................................................................62 Usage Scenarios..........................................................................................72.1 Users.....................................................................................................72.2 Use-Case Diagram................................................................................82.3 Special Usage Considerations.............................................................93 Data Model and Description......................................................................103.1 Data Description................................................................................103.2 Data Objects.......................................................................................103.2.1 Client...............................................................................................103.2.2 Server..............................................................................................103.2.3 Files.................................................................................................103.3 Relationships......................................................................................103.4 Complete Data Model........................................................................113.5 Data Dictionary..................................................................................123.5.1 GUI..................................................................................................123.5.2 SFTP................................................................................................123.5.3 SSH.................................................................................................123.5.4 TCP/IP.............................................................................................124 Functional Model and Description............................................................134.1 Server Functions................................................................................134.1.1 block().............................................................................................134.1.1.1 PSPEC......................................................................................134.1.1.2 Function Flow Diagram...........................................................134.1.1.3 Interface Description...............................................................134.1.1.4 Performance Issues.................................................................134.1.1.5 Design Constraints..................................................................134.1.1.6 Transforms...............................................................................134.1.2 disconnect()....................................................................................144.1.2.1


View Full Document

WVU CS 430 - SOFTWARE REQUIREMENTS SPECIFICATION

Documents in this Course
Lecture

Lecture

28 pages

Design

Design

27 pages

Load more
Download SOFTWARE REQUIREMENTS SPECIFICATION
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view SOFTWARE REQUIREMENTS SPECIFICATION and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view SOFTWARE REQUIREMENTS SPECIFICATION 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?