Requirement Specification Of The Software Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

The requirement specification of the software is generated by the time of formation of analysis task. Based on functional representation ,system behavior of representation, an indication of performance requirements, appropriate validation criteria and design constraints the perfect software regarding the performance and function is built.

User Interface

Swing - Swing produce more powerful and flexible components which is made up of AWT (Abstract Windowing Toolkit) with the collection of class. In the similar way of familiar components like labels, button, and check boxes. The swing also came up with the new exciting facilities like scroll panes, trees and tables, and tabbed panes.

Hardware Interface

Hard disk : 40 GB

RAM : 512 MB

Processor Speed : 3.00GHz

Processor : Pentium IV Processor

Software Interface

Language used - Java (Java Development Kit JDK 1.5)

Operating System - Windows XP/2000

3.5 Java and JDK

Java is a platform independent language which extends its features across the network and has the oops (object-oriented programming language) concept. Its a high level language which have the build in libraries of reusable software components. Java was introduced by "James Gosling, Patrick Naughton, Chris Wrath, Ed Frank, and Mike Sheridan around 1990's at Sun Micro system".

Java program should undergo the two steps in its execution process which are compilation and interpretation. The compiler will translate the Java program into an intermediate language which is understandable by the system known as Java byte codes- by the Java interpreter the platform -independent codes was interpreted. The interpreter will parse this Java byte code instruction and execute on the system. Compilation happens only one time whereas interpretation happens every time when the program got executed. The below Figure 3.1 illustrates how the process flows. [6]

For the java Virtual Machine the machine code instructions are given as input by Java byte code. Every Java interpreter, irrespective of whether it's a web browser or java development tool that are able to run Java applets leads to implementation of the Java VM. The JVM can also be implemented in hardware.

Java byte codes helps to make "write once, run anywhere" possible. The Java program can be compiled in any platform into byte codes which has a Java compiler. For the Java VM the byte codes can be run on any implementation. For example, the same Java program can run on Windows NT, Solaris, and Macintosh.

With the Java byte codes the quotation "code once, run multiple times" suites better. Since Java is platform independent language the Java program can be compiled into byte codes in any platform which has a Java compiler. The byte codes can be run in any implementation of JVM

Figure 3.1 Java Program Compilation and Interpretation

Java2 version came up with a new component called "Swing".The platform specification code is not implemented though the package is light weight. Javax.swing and its sub packages(i.e. Javax.swing.tree) are related classes of swings. Components described in the Swing have more capabilities than those of AWT.

JDK - The JDK is written in Java language which contains the software and tools needed to compile, debug and execute applets and applications. Tools under JDK are javac compiler to compile java source code and convert that into byte codes, java interpreter used to run java byte codes, applet viewer used to view and test applets and java doc is the java documentation tool.

Chapter 4

System Analysis

The in detailed study of various operations performed by a system and their relationship within and outside the system is known as system analysis. Determining whether the candidate system should consider the related systems or not and defining the boundaries of the system is one of the aims of system analysis. While analyzing the system the data will be collected on the available files and transactions. System analysis is not how the system will achieve its goals but it is identifying what is needed from the system.

It has the view of making system effectively by identifying inefficiencies in existing system study.

The project is divided into two modules named as CAR and MCAR. Again these CAR and MCAR are divided into two and three sub modules respectively. The three sub modules of MCAR will represent the entire workflow of the system.

1. CAR

A. Network Formation

B. Conzone Discovery

C. Differentiated Routing


A. Network Formation

B. Setting Modes and Routing Data

4.1 CAR

CAR fallows three stages: network formation, conzone discovery and differentiated routing. These three functions will segments the network into two conzone nodes. one is on-conzone and other is off-conzone. Only HP traffic is routed within the conzone nodes and LP traffic is routed out of the conzone.

4.1.1 Network Formation in CAR

In the formation of network all the nodes are inter connected and each node will be assigned by some depth. Initially all the nodes are in off-conzone. Node N1 is considered as a critical area node. Node N1 is connected to N2, N2 is connected to N3, N4 and N5. Nodes N3, N4 and N5 are connected to Sink. In sink there are three JPanels two LP JPanels and one HP JPanel.

CAR forms a HP network, nodes forwarding HP data forms HP network, by dividing nodes in the network as congestion zone nodes and off-conzone nodes. Only on-conzone nodes will forward the HP data. LP data generated inside the conzone is routed out of the conzone.

If the life of the HP traffic is short or the congestion zone is changing frequently or often if data source is moving again and again, then the formation of HP network is very critical. CAR requires some overhead to find out the congestion zone if conzone is changing frequently. This is the limitation in CAR. To identify the movement of the data sources MCAR is preferred. If the mobility of the data sources is less, in that case CAR is preferred. So CAR will be used for the applications with low mobility, and MCAR will be used for the applications with high mobility.

N1(critical area node)









Figure 4.1: Network Formation in CAR

4.1.2 Conzone Discovery in CAR

Conzone discovery mechanism is used to discover the nodes on the conzone. For the delivery of HP data the conzone must be discovered from the neighborhoods. The critical area nodes broadcast "discover conzone to sink" messages to discover the conzone from the neighborhoods. This message is called as To_Sink message and consists of source ID and depth. This will be send to all of the neighbors. If the threshold Thre_Alpha distinct To_Sink messages received by node from neighbors are more, it marks itself as on_conzone. It sends a To_Sink message to its neighbors and mark itself as in conzone. If

To_Sink messages are less than Thre_Alpha then the node marks it self as off_Conzone.


Here, Dx=Depth


Nx=Neighborhood size

The number of nodes within the communication is known as neighborhood range.

4.1.3 Differentiated Routing in CAR

Once the Conzone is found, in differentiated routing, The two prioritized data, one is routed to conzone (HP) and the other routed off the conzone (LP). LP data generated inside the conzone is routed out of the conzone. HP data is received from Sink in HP JPanel and LP data is received in either of two JPanels.[7]

4.2 MCAR

MCAR is divided into three steps: network formation, setting modes and routing data.

4.2.1 Network Formation in MCAR

In the formation of network all the nodes are inter connected and depth is assigned to all nodes. Since the sources or sinks are expected to mobile, MCAR does not form an HP network. Instead of that HP paths will be dynamically created.

4.2.2 Setting Modes and Routing Data in MCAR

In setting modes each node in a network can be in one of the three modes: LP mode, HP mode or shadow mode. A node dynamically changes its state and route the appropriate data.

LP Mode: In this mode, nodes forward LP data. All nodes in the network are initially in the LP mode. Upon receiving an LP data, nodes remain in the LP mode and forwards LP data, if a node in the LP mode receives an HP data, it transitions to the HP mode and forwards HP data.

HP Mode: Nodes in the path of HP data are in the HP mode. Node that forward HP data would change as HP mode. If a node in this mode receives an HP data it stays in the same mode and forwards HP data. If a node in this mode receives an LP data either it changes to LP mode and forwards LP data or it changes to shadow mode and drops the LP data.

Shadow Mode: In this mode if node receives HP data it transitions to the HP mode and forwards HP data. If a node receives LP data it drops the LP data.The drawback of MCAR is it neglects the service provided to LP data when the node turns to shadow mode it drops the LP data.