Experiment 1: Aim: Prepare A SRS Document in Line With The IEEE Recommended Standards
Experiment 1: Aim: Prepare A SRS Document in Line With The IEEE Recommended Standards
Experiment 1: Aim: Prepare A SRS Document in Line With The IEEE Recommended Standards
1.1 Purpose
The purpose of this document is to provide a detailed outline of the
requirements for the development of an E-Car Rental System. It aims to
define the functionalities, constraints, and dependencies of the system
to ensure a comprehensive understanding by all stakeholders involved
in its development and implementation.
1.2 Scope
The scope of the E-Car Rental System encompasses the development of
a web-based application that facilitates the rental of vehicles to
customers. The system will allow users to browse available cars, make
reservations, process payments, and manage rental bookings. It will also
provide administrative tools for rental companies to manage their fleet,
monitor reservations, and handle customer interactions.
1.4 References
7. Wikipedia, Online. 'Use Case Diagram'. N.p., 2015. Web. 9 June 2015.
1.5 Overview
2.1.2 Interfaces
User Interface: The system will provide user interfaces for customers,
administrators, employees, and maintenance managers, each with
specific functionalities tailored to their roles.
Hardware Interfaces: The system will require server-side hardware with
specific specifications for processor, HDD, RAM, OS, Database, and
Application. Client-side systems must also meet minimum requirements
for processor, HDD, RAM, and OS.
The system will utilize HTTP and FTP protocols for communication
between the server and clients. It will also use TCP/IP network protocol
for data transmission.
The system will have memory constraints based on the server and client-
side hardware specifications.
2.1.7 Operations:
2.4 Constraints
Assumptions include:
3. Specific Requirements
The system will provide user interfaces for login, profile management, and
order processing. It will also require hardware and software interfaces for
server and client systems.
3.2 Functions
The system will prioritize security measures to prevent SQL injections and
ensure data integrity. It will also require an internet connection for
operation.