Preview

Introduction Fasam System

Good Essays
Open Document
Open Document
561 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Introduction Fasam System
Requirements Document

Purpose

Introduction

The primary goal of this document is to provide a complete and accurate list of requirements for a Fire and Security Alarm Monitoring System. Upon completion, the document will act as a binding contract between developers and users and will provide a common point of reference for system

Document Conventions

Although this document is intended as a set of Requirements, not a design, some technical information has been included with the requirements description.

Intended Audience

The primary audience of this document includes, but is not limited to, project leaders, the designers and developers of the system and the end user. (Reference 1)

Background

Team International is primarily a software developing company specialising in fire and security alarm monitoring system (‘FASAM’).

Team International has been awarded the contract to supply and implement a FASAM for Everett & Co.

The building in question is a new building, so there is no previous FASAM system installed.

The building in question consists of 2 floors, each floor consisting of 12 offices.

The building will be grouped in ZONES. Zones will consist of x-amount of offices. Below is an example of this. Keep in mind that this is not the actual zone layout representation but just an example to illustrate how the zones will work.

[pic]

Each zone shall be equipped with various sensors which will monitor for and detect certain threats.

Each zone shall have security / fire doors installed which the FASAM will have control over in regards to locking and unlocking depending on the threat.

Team International has decided, after gathering the requirements, that an automated system with a manual over-ride option, which will be connected to a central control room, will best suit the needs of Everett & Co.

Product Scope

Processes involved in the project scope

The development of this system will include the gathering

You May Also Find These Documents Helpful

  • Powerful Essays

    SOW MARSOC CCE ISR

    • 951 Words
    • 5 Pages

    The specific requirements will continue to evolve and expand. However, the general requirements for this exercise are…

    • 951 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    One of the most vital aspects of fire protection is to recognize a budding fire emergency as soon as possible, and to notify the facility's tenants and proper emergency groups. This is the primary function of all fire detection and alarm systems. Depending on the expected fire situation, structures and type, quantity and occupants (health care, business, residential, industrial, and day care), and criticality of contents and mission, these systems can offer multiple key functions to aid in the safety of the occupants (Department of Veterans Affairs (Office of Construction & Facilities Management) , 2011). Their first two functions are the most vital. The first being a way to identify a fire hazard as it transpires through either manual or automatic methods. Secondly, it alerts the structures occupants to an imminent fire hazard and the need to withdraw from the building. Another common function in a non single family structure is to send an emergency alarm notification to the local emergency response organizations. Some systems are even designed to sensitive systems to…

    • 2396 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    function of the new building is to provide office space for software development and testing of…

    • 2372 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Howard Sheldon Stage 4

    • 1192 Words
    • 5 Pages

    The owner should instal the system to insure it is functioning properly and to work out with the software company any problems or complaints.…

    • 1192 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The team is comprised of the information systems manager, project manager, systems analyst, and programmer. The team will then collaborate with the HR employees of Riordan manufacturing throughout the whole process. Information will be gathered for the analyst to use through documentation, interviews, work observation, and statistical data. The programmer will use flowcharts, data-flow diagrams, the current SDLC waterfall plan, and RAD to design the preliminary system. The IS manager will then break down the…

    • 1264 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Army Regulation 190–51

    • 37089 Words
    • 149 Pages

    o Consolidates paragraphs 6 through 9, 11, 13, 15 through 17, and 19 of AR 190-18…

    • 37089 Words
    • 149 Pages
    Powerful Essays
  • Good Essays

    It510 Final Project

    • 1574 Words
    • 7 Pages

    There are several techniques used in the documentation process. As a system analyst I would propose to the members of this group a straightforward standardized approach. A reasonable suggestion for this project would be to use the Procedure Manual technique for documenting this system. The Procedure Manuals will provide instructions on how to operate and understand how the system works. These manuals are also used as a guide that can be updated at different intervals for future users. Procedure Manuals are also made available to users via the Web. This new approach has made it convenient for users to seek support in a much faster way by offering a FAQ page, and online chat (Kendall & Kendall, 2011). In addition it is also a great tool for future analyst.…

    • 1574 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Capstone Checkpoint

    • 270 Words
    • 2 Pages

    I believe that it is essential for security professionals to be well familiar with their surroundings and have great knowledge of their primary targets, while roaming their environment. It is critical that all security professionals must maintain full control of the environment they are assigned to, and are aware of not leaving a vulnerable gap to the criminals. These security professionals must be ready to notice the slight changes of the environment, and must keep in mind that all areas are different. Therefore, they must plot a defense mechanism based on the type of environment they are assigned to.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CJs 250 Criminal Justice

    • 513 Words
    • 4 Pages

    Axia College Material Appendix D The Three Models of Physical Security Directions: Read and study the description of an office building’s physical layout and its ...…

    • 513 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Regular testing of the fire alarms take place every six weeks at the School. The log book is kept by the business manager, this is available to any visiting fire officer.…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    Sunica Music and Movies is a company that currently has four locations. This business is ready to improve the way they do business by implementing a computerized network that will allow for centralized accounting and inventory as well as starting a web-based e-commerce site. The following document provides an in-depth look at the implementation of policy and procedures that will help this transition to become successful.…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Security in Hospitality Industry comprises of passive security systems, which includes fire and life security (detection, evacuation, use of extinguishers and danger management processes). The second level is called active security components, which includes video surveillance (CCTV), access control, intrusion detection systems and x-ray machines at the hotel’s main entrance. A third level is called hard security systems, which can help avert or manage serious threats such as terrorist attacks.…

    • 3064 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Immediate warning and increased incident management efficiency: Each on-campus building has been fitted with Intel Inside’s active Smart Building Gateway, which is connected to and integrated with over 4,000 environmental sensors. There is complete 24-hour monitoring of the buildings’…

    • 708 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security Alarm

    • 559 Words
    • 3 Pages

    Not so long ago an alarm was a fairly rare sight, however now almost every house has an alarm of some kind. One common kind of security system is an infrared home security system. These are so popular because they are easy to install without having to drill holes and lay cable infrared radiation is invisible to the human eye but can be detected by electronic devices designed for such a purpose.…

    • 559 Words
    • 3 Pages
    Good Essays

Related Topics