Loading

Module 1: System Design

Note di Apprendimento
Study Reminders
Support
Text Version

Institute Service Kiosk Terminals(InSeKTs)

Set your study reminders

We will email you at these times to remind you to study.
  • Monday

    -

    7am

    +

    Tuesday

    -

    7am

    +

    Wednesday

    -

    7am

    +

    Thursday

    -

    7am

    +

    Friday

    -

    7am

    +

    Saturday

    -

    7am

    +

    Sunday

    -

    7am

    +

So, we will seeanother example today. This is more relevant to the institute. This project was done bystudents. We gave this problem to the students when to apply the engineering systemdesign principles, and then how do we actually develop a system which can beimplemented in the institute.So, this system is known as the InSeKTs, which actually stands for institute service kioskterminal the objective of this terminal is basically to provide the services to IITcommunity, basically as an initiative for IITM’s is e service enhancement program.(Refer Slide Time: 01:10)
So, it is proposed to introduce these terminals at strategic locations to help IITMcommunity and visitors with various services. So, we want to provide the various
services to the IITM community through this service kiosk. This service as a means forproviding support to user when he is in the institute, and the support we will have twomajor components; the information component as well as the service component. In theinformation component, the system will provide various information related to IIT aswell as to the surrounding areas, about Chennai and the flight service information, traininformation, bus information and all related information about the institute, and then therelated services, see related areas.Then the other part is basically providing services. So, one is the information part, theother one is the service part. Services actually provide various services to the students aswell as the faculty in various aspects of the academic life. We will discuss this, what arethe services to be provided and what kind of information to be provided in the system.So, based on this we define the mission of the project, and then identify the requirementsand then go ahead with a system design again here there can be multiple servicesprovided. So, we do not consider all the services in this case. Of course, we can actuallyadd any services to the particular system. So, we take few services and few informationrequirements of the system and then we discuss how do we design the system based onthe principles whatever we studied so far.(Refer Slide Time: 03:00)
So, as I mentioned the information component will provide the user with informationabout institute place Chennai, and the people at IITM, various location of various
buildings, the location waiting time for buses etcetera as we decide by the user. So, theseare the information component to be provided by the system, and then here the servicecomponent which will provide the user with services like internet fax, telephone charges,the printer, then paying fees for the students, and this kind of services will be providedby the service component. So, looking at these two we can actually develop the missionfor the InSeKTs, basically to make the user hospitable in the campus. So, it should beable to make an outsider feel independent in the campus. It should also aid the IITMcommunity by providing easy assistance. It should deliver easy info and should be quickand user friendly, and it should provide emergency assistance when needed.So, the services basically to make sure that the user or a person coming to IIT, he shouldfeel that he can actually get all the information. He is independent, you do not need todepend on many people for various services or various information. So, he will becomfortable in the campus. He can actually go to the kiosk, can get all the informationwhatever he wanted, as well as we can find out the location of the buildings. You canfind out the availability of services, and if he wants to make telephone call or he wants tomake an internet search, or he wants to pay some fees or hostel fee for his what. So, allthis things can be done easily using this terminal. So, the basic objective is to provideinformation, as well as service to the visitors, as well as to the community within the IITcampus.So, how do we provide these services through the system?
(Refer Slide Time: 04:48)
So, mission objectives here can be classified into three, basically online access to variousservices, academic, administrative and general, to the students, staff and visitors withvarious levels of accessibility. So, we will be having a various services provided in thesystem, but there will be various levels on accessibility also. So, the some of the data canbe accessed by students, some can be accessed by staff, and some can be accessed byvisitors. So, there will be various levels of accessibility to the services. In the informationregarding location of classrooms, maps and navigation information within the campuswill be provided. So, these are the objectives, we need to provide their services then theinformation. Then utility services like telephone, fax, email, printing etcetera also will beavailable at this service kiosk.So, we have identified the objectives of the system. So, we have main objectives likeproviding information, providing services related to academics, and the providinggeneral services like utility services; like telephone, fax, internet, email and other utilityservices like printing, and other things. So, these are the main mission objectives of thesystem.
(Refer Slide Time: 05:59)
And apart from this we can actually provide the weather data, train fight scheduletimings again coming under the utility services. You can provide the weather data as wellas train flight schedule timings, than providing information about the city, maps ofChennai and nearby places, bus, train and road routes in and out Chennai. Then provideinformation about location and waiting time for institute bus.So, we have an institute bus service. So, we can actually provide the timing of the thesebus services, and the wheather the points where outsiders can actually get this busservices. Then provide information about people in IITM. Like the address telephonenumber, email id etcetera of outsiders. So, they can actually do a search in the networkthe internet, and get the details of the information about people, especially faculty andother administrative staff.
(Refer Slide Time: 06:48)
So, what are the general requirements for the systems? Now we know the objective. Wehave identified the mission objectives and the general purpose of the system. So, how dowe actually provide these? We need to identify the general requirements. So, generalrequirement for the system are basically the InSeKTs should provide real time services,information and assistance to IITM community visited 24 hours a day 7 days a week forthe following events.So, we have clearly specifying the general requirements, the system should befunctioning twenty four hours a day and seven days a week, and providing the serviceslike when the user need, some information or assistance it should provide, and the userneeds emergency help and services. Then the user needs a utility services; like telephonefax print out and the internet, user needs locations and navigational aid in and aroundChennai and user needs information about Chennai. So, these are the generalrequirements we can identify. So, we state these requirements clearly, because these arethe requirement identification stage, when we develop the system, we need to clearlyunderstand the requirement. So, we write down the requirements what are the basicrequirements for the system, like it should be a continuous service without any delay orwithout any break in between, and they should provide the services as listed here.
Then we can go for the specific requirements. So, those were the general requirementswhich actually, we can identify from the mission objectives. So, to satisfy these generalrequirements, we need to identify the specific requirements of the system.(Refer Slide Time: 08:23)
These are listed here; the InSeKTs system shall have an availability of 0.99. So, the breakdown time should be very less. The InSeKTs system shall connect to GPS satellite withinone minute of switching on. There is another specific requirement, because we aredepending on the GPS system for the navigational aids. So, the system should connect toGPS within one minute of switching on. The InSeKTs system shall connect to internetwithin one minute of switching mode. Of course, these timings again it is up to thedesigners to decide.So, based on many parameters they can decide what should be the minimum timerequirement for getting to the internet or to the GPS system. So, when the InSeKTssystem show location of institute bus within two meter of error. So, that is the errorallowed, within two meters it should show the allocation of the institute bus, real timeinformation should be provided. Then the system shall provide for telephone service forlocal and emergency calls also. These are some of the specific requirements of thesystem.
(Refer Slide Time: 09:17)
Also the system shall provide railways or airways schedule and status accurate to 0.1percent in error. The InSeKTs system shall provide fax and print out service withinavailability of 0.95.The InSeKTs system shall provide internet services for IITM community. The InSeKTssystem shall have a mean time before failure as 20,000 hours, and their mean time torepair of 5 hours. So, within 5 hours the system should be a able to come back to itsservice note even if there is any repair. So, like this looking at the general requirements,which can actually get the specific requirements of the system, and all theserequirements need to be documented as originating requirements document. So, we willsee how we actually convert this into the documentation, or how do we write down theactual requirement based on the general, as well as the specific requirements. Then againwe have to go for the scenario tracing and find out the input output requirements also.So, once we have all these requirement, then we will start recording this as theoriginating requirement document. So, these are some requirements, a specificrequirement like the system shall provide weather forecast data in coordination with livenews channels. The InSeKTs system shall provide information about Chennai and placesin radius of 10 kilometer. Again this 10 kilometer is an arbitrary value, it actuallydepends on the designer, what is the requirement and then accordingly write therequirement. The system shall provide information about local transport, the bus routes
train and road maps in the Chennai and then InSeKTs system must provide maps andnavigation about IITM to visitor.So, this is again an important part. The system should be providing the navigation aid tothe outsider. So, whenever he wants to go to a particular place in IIT, he should be able tolocate himself in the map, and then identify the route to the desire building or desirefacility, and then how to reach there, and this actually should be linked to the bus serviceavailability, and the present position of the bus, and expected arrival of bus stop thatlocation. So, all this information should be available in the system to help the visitor.(Refer Slide Time: 11:26)
So, let us look at the system design aspect, what we discussed about the system vee.Basically we look at the system design from the system vee process.
(Refer Slide Time: 11:38)
So, as we discussed earlier, they we can actually develop a system vee diagram, to showhow we actually go ahead with the design of the system. So, in the system we willprocess is like a vee. So, we start with the disintegration of the system, and then we gofor the integration.So, we start with the mission statement, user wants and needs plus emergencyrequirements which we have identified some of the requirements. And then we go to thenext level, where we identify the machine level inputs requirement user powermaintenance interfaces in GPS internet and intranet requirements.
(Refer Slide Time: 12:13)
And then we go for the requirements of characteristics and attributes of, and thespecifications of the individual components needed. So, we will be defining the systemand in this. While defining the system will be identifying the machine levelrequirements, and the characteristics and attributes of various components, then theirspecifications.(Refer Slide Time: 12:34)
And then we go for the system subsystem or subsystem design requirements, andspecifications. And here we will be taking many the requirement cascades and the
feasibility, functions will be taken into account, and there will be interacting to get thesystem and subsystem design requirements and specifications.Similarly, we will be going for the details of the parts and components. Once we identifythe system and subsystem, we can go for the part and component design specifications.(Refer Slide Time: 13:03)
So, here we develop the individual components and parts for the system, and then wewill go for the fabrication of the system; the components application; part andcomponent fabrication and verification will be done.(Refer Slide Time: 13:17)
And once these parts and components are verified, we will go for the system verification,and then fabrication of the first prototype from the this component.So, we will start with the integration of the system and make the prototype.(Refer Slide Time: 13:39)
And then we go for the verification and production and testing of the complete system.Based on the qualification test, we will decide to go for the update or updating thesystem, and finally, we will be providing in this to the customer.(Refer Slide Time: 13:43)
And it will be getting the customer satisfaction to. This is the system vee diagram, wherewe start with the identification of the requirements, and then we go for the concepts forthe system operation, and then we discuss about the other requirements like emergencyrequirement, maintenance requirements and all other requirements. And we go for thecomponent identification component and sub system identifications will be done. Andthen if needed will be designing components and sub systems, and then fabrication ofthis will be carried out, and then integration will start. We will start assembling thesecomponents and then make a system with a few terminals, and then do the trials andqualification testing will be carried out.Bases on the qualification testing we will be updating the system, and finally, it will begiven to the user for using. So, that is the process of development of the whole system.So, from identification of the requirements, till the delivery of the system with the manyterminals in the system, that will be the complete process, and once it is accepted by thecustomers, then that actually completes the design process. So, this is the way how weactually go ahead with the system design. We will not be going through are these stages,because the integration qualification etcetera, are all depending on the actual systemdeveloped.(Refer Slide Time: 15:09)
So, that will be looking at the disintegration. So, we will start with context diagram.
The context diagram basically tells you, what will be the approximate concept that willbe using for designing the system. So, this actually will identity the external systems, andwhat kind of interactions are taking place between the terminals and as well as the users.So, all this will be identified in the context diagram. So, this is the context diagram. So,we can see that the terminals will be at different locations are provided in the campus,and there will be a users from inside the campus, as well as from the outside the campus,and there may be different databases which should be connected to the system, basicallythe database about the IIT facilities, and the locations of the various buildings etcetera.And there will be an internet connectivity to the system, and then for utility services likefax, printer, and telephone will be available with a very terminal. And there will be aemergency support service. There may be a customer support service, directly connectedto the terminal.So, in case of an emergency, the customer support will be activated, and then we can getthe emergency services. Similarly there will be other features like the connection to theGPS system. So, will be having a satellite or GPS connection, and then we have the otherinformation like flight services or train services, and then we maybe a. We can actuallyadds some features; like delivery or some equipment needed for the institute or thestudents, where if needed that also can be connected. So, these are the possible externalsystem that you can have, which is the context diagram for the system, there actually awe identify all the requirements, or all the system which need to be connected and whatkind of interaction needed between these systems.So, based on this context diagram, we will go for the detailed system design. So, we lookat the scenarios under which the system will be used, not to identify the input outputrequirements, we go for the scenario tracing and getting the requirements.
(Refer Slide Time: 17:15)
So, we know to do this will have consider various operational scenarios. So, as you knowthe operational scenarios varies a different situations. So, we will look at the variousscenarios. So, one scenario we can identifies that, visitor uses InSeKTs to find thedirections in IITM campus. So, this is one of scenario. So, we will go into the details ofthe scenario, and then see what are the different activities, the operator will be carryingout and accordingly we identify the requirements. So, here we start with the visitorswitches the device on. So, assuming that the device is switched off, now we assume thatthe visitors we need to switch on the device and the feedback will be given that thedevice is switched on.So, that the customer I will know that it is on position and can actually provide servicesand then the feedback request type of user; that is the system will be asking for afeedback requesting for the user, type of user whether he is a inside visitor, inside personor an visitor from outside. So, that information to be provided and depending on the userselection option, and then the option will be provided by in the system for the user toselect that actually the requirement is. So, here this a, thus option to get directions andlocations of various buildings in IITM campus, will be selected by the visitor. So, thesystem has to display all the options for depending on the sets of the user, whether is avisitor or IITM community person. So, accordingly will be having a different options andthen there are user can actually choose the option.
(Refer Slide Time: 18:47)
And then the feedback device will show the current location and important landmarks inIIT campus.So, the current location of the person will be shown, and then various other importantlocations also will be shown on the map. Then the request directions from one location toanother, then the user can actually request for direction from one location to another. So,this is shows that the system should be a capable of taking an input from the user to givethe input. So, there should be a provision in the system to take the input from the user togive this data input. So, the location, he has to choose the location, where you wants togo, and then he will be getting a feedback about the directions from one place to anotherplace.So, this direction will be shown on the map or, but in a form of feedback, either in theform of a map or a kind of a print out, will be given as an feedback and then feedback onoption to print map of IITM campus. So, if you Wants you can actually print the map,and then user selects option to print the map, and then the feedback map with the desireddirection is printed and the important landmarks highlighted.So, again the feedback will be given to the user at the map has been printed with thelandmarks highlighted. And if the user is satisfied, he logs off and then logs out from thesystem gives a feedback that the customer is logged out, and the feedback the user hasbeen successfully logged out of the network. This is the series of activities taking place
when the user ask for a help from the system, using for the purpose of navigation withinthe campus. Like this we can actually identify a multiple scenarios, and for each scenariowe can develop this kind of a detailed tracing of the scenario.What kind of activities are taking place, when executing one particular scenario.(Refer Slide Time: 20:32)
So, this is another scenario, where the user uses a InSeKTs for accessing the internet. So,what are the different stages or different activities involved in the accessing thisparticular service. So, user switches on the device, then feedback the device is switchedon, then the feedback requests type of user.So, this will be the common for all the applications, because the every case, the systemhas to identify the user and whether if we belongs to the IITM community or an outsidevisitor. So, accordingly you can actually the options will be given by the system. Fromhere you can actually if it is for internet service then we have to provide the usernameand password for accessing the internet service, then user enters username and password,and feedback the user is logged in and if password is correct; otherwise it will be goingto another loop, where the password is not correct.Once he is logged in then you can actually select the internet option, and then feedbackthat internet has been connected and he can use the internet as per desired. And thenagain the logging of will be similar to the one, the previous scenario he once the he
satisfied with the service he can actually log off, and then the feedback will be given thathe has logged of the system, and that actually ends that particular scenario. So, here bythe idea of having these kind of scenario tracing, is to find out what are the differentrequirements, you can identify from these scenarios. In this case we know that thereshould be a feedback that the username and password to be given. So, for the particularservice you need to give a output from the system or a feedback from the system,requesting for the username and password.So, if that is correct then only the person can actually access it. So, similarly theseactivities gives the some other requirements; like the feedback what is needed. Similarlyhow do we actually enter the data, how do we actually identify the person whether it is apassword, or it can actually have some other kind of option to identify the users. So, onthese kinds of requirements can be easily identified using the scenario tracing.(Refer Slide Time: 22:37)
So, here again this I had already told you, that how do you actually come out of thesystem that the feedback is given; a logs out when finished and the feedback user hasbeen successfully logged out of the network, that actually completes that activity.
(Refer Slide Time: 22:49)
So, this is another scenario. Again for making a phone call. So, what are the stagesthrough which the sort of, it will be going through in order to get that one. So, here againfirst two will be the same then the user selects the telephone option. Then feedback thetelephone is activated, and feedback telephone asks the user to insert coins, if it is a coinoperated system or if it is a card operated, then the options will be different.So, again here are the designer have to make a choice, whether what kind of a systemshould be provided or what kind of facility to be provided for activating the telephoneservice. And then feedback dial tone is switched on, the user dials number and feedbacksound of numbers being dialed and call being connected. So, of course, this is part of thetelephone service. So, we do not need to have a requirements identified for the phone,once it is connected to the telephone network, and all these things will be automaticallytaken care of.
(Refer Slide Time: 23:44)
And this is basically how do you end the telephone conversation, if it is basically of bythe coil or the card, then that there will be some feedback about the timings, and once themoney is finished or we want to add more of information will be provided. And once theuser finishes call and places back the receiver, there will be a feedback that the telephoneline is switched off and call is disconnected. And then user switches of device andfeedback devices switched off, that will be given as a feedback.So, these are the various activities for that particular action.
(Refer Slide Time: 24:15)
This is another one, and similar to the previous one, let basically sending or receiving afax document. Again most of the initial activity should be almost same, instead oftelephone, he will be connecting to a fax option, and then fax service will be provided.So, here we need to see is, how do we actually provide the user with the some facilitiesfor feeding the paper, and then directly connecting to the fax machine. And then oncethey leave the feedback that it has been completed, then actually we can log off similar tothat of the telephone service. So, again the idea is to get all the activities are noted downor recorded so that we can see whether any particular additional requirement is to beprovided in the system to meet that particular service.(Refer Slide Time: 25:04)
So, this is again the same, the fax service, or how do we actually identify the requirementfor a fax machine, fax service, what are the various stages to be identified.
(Refer Slide Time: 25:16)
This is for the railway or airline status or scheduled information. So, here actually theuser will be a selecting an option of this, available in the system, and based on that therequired information will be provided if it is a paid service, then he will be asked to paypay the money; otherwise there information will be provided to the user, and the userrequest the schedule, the feedback will be given about the train or a air services. Andthen based on the feedback again he will be giving the details and then user requests thereservation status of the ticket if it is booking a status enquiry, and then feedback onconnecting with server and reservation status is displayed, and user is satisfied andswitches off the device and device switched off.So, that is the activities carried out by the user, when he is using this particular service.
(Refer Slide Time: 26:08)
Again another one is printing the data, if you wants to print a particular data from thesystem, or want to make a printout from data provided by the user, again that will be aoptions provided by the system. So, user can select the printing option, and then therewill be a feedback that the printer is activated or not activated. So, if the printer is not inoperation, then there will be a feedback giving, given that printer is not available;otherwise you can actually use the printer or the feedback will be given that the printer isin working condition.And then the input that will be given, and then user gives data and feedbacks as fornumber of copies, and user enters desired number of copies, and then feedback type ofprinting, and whether it is a color print or black and white print that kind of options willbe provided, and then feedback printing data is done after completion, and then userswitch off device and the feedback is, device is switched off.So, again some of the things can actually be combined to the printer functions, but in theinitial stages we need to identify all the activities. So, that we do not miss out any of therequirements of the system. So, that is the idea of get being the all the details of thatparticular activity.
(Refer Slide Time: 27:20)