3. Non-functional Requirements

This section will address all aspects of the Eclass tool that deal with the performance (e.g. time and space) and other general characteristics. The functions performed by the tool are not discussed in this section.

3.1 System Performance

     a. Time
        Most of the Eclass operations occur instantaneously as they are used. However, since the lecture notes are all opened from the Network at each individual workstation, the amount of time it takes to login and open a lecture is very dependent on the speed of the Network. Saving is another issue that may slow down the performance of the Eclass tool. If the entire class attempts to save the changes to their private layers, they will once again need to connect to the Network to store the data into their individual folders.

     b. Space
        A lot of space will be required to store the lecture notes and all other data used in the Eclass tool for the quarter. Private layers are combined with the lecture slides and saved as a PDF, which will require a lot of space especially as the quarter progresses. The video and sound recordings will take quite a bit of space as well. The Q&A and Post-it logs are stored as HTML files and, therefore, will not require too much space.

3.2 Qualitative System Characteristics

     a. Reliability
        This software is designed to be a very reliable source for students and instructors by providing an interactive classroom environment. Replacing the use of paper notes and handouts may reduce some reliability; however, this reliability does not depend on this software, but on the Network.

     b. Robustness
        This software is a very powerful tool that gives lots of control to individual users as the instructor sees fit.

     c. Accuracy of Data
        The data in this tool is as accurate as the instructor makes it. The instructor creates the lecture notes and posts them for the students to open with the Eclass tool. Therefore, it is assumed the the data is accurate.

     d. Correctness
        Once again correctness of the lecture notes all depends on the instructor. However, the student interactions allow the students to note any corrections that need to be made.

     e. Security
        The instructor interface of Eclass has access to some vital information for the instructor (e.g. Grader). In order to verify that the person accessing the instructor interface is actually the instructor, Eclass requires a matching user name and password to allow the instructor access to the application. A password and user name combination is required for the student to access their machine as well, to protect the information that the student compiles over the course of the class. Cal Poly has a firewall implemented that also increases the level of security for the Eclass information.

     f. Privacy
        All users of Eclass, instructor and students, need to have some hard drive space delegated to them for storage of all the different files created by Eclass. Cal Poly grants space on servers for each individual student, and the Computer Science department also assign student's space on either of their servers to store files. These are the primary location for saving information created by Eclass. This space is only accessible to the user according to a combination of user name and password.

     g. Safety
        Eclass allows for an environment where there is much regulation, in hopes of preventing needless user error. By having the instructor as the administrator over the student machines, control is taken out of the hands of the student, and into those of the instructor. With one person mainly in control, there is less room for error.

     h. Portability
        For the time being Eclass is limited to the explicit sub-network designated by the instructor. The application can be installed on any machine, but must be connected to a specific sub-network, in order for Eclass to recognize the user. With the advancement of technology, students can use a form of Remote Desktop, which allows the student to use their computer, from an outside location to access the machine in the sub-network. Student's doing so at Cal Poly would need to be able to bypass the firewall run by the school, but can be allowed access through firewall pinholes.

     i. Modifiability and Extensibility
        Eclass has been created as per the specifications of a specific user, Dr. Gene Fisher. The needs of instructors change over the course of a class though and therefore requires the need for modifiability. The instructor is able to use Eclass in anyway they deem fit. There are tools created for Eclass that the instructor may, or may not use, and will not hinder Eclass's functionality. Eclass is fairly loosely designed to allow for use with other applications, per the instructor's desire.

        Besides modifiability, Eclass has the ability of a more wide-spread user range than Cal Poly Computer Science classes. Eclass remains fairly neutral in much of its functionality and therefore can be used in different environments that have the necessary tools. As more needs are presented, Eclass upgrades can be created to accommodate these needs to a more general populace, without losing the individual touch of the instructor.

     j. Simplicity vs. Power
        Eclass is as simple an application as can be designed for the intended function. Much of the work is done without the knowledge of the student, although the instructor does see a bit more. This simplicity does not sacrifice any power though, as the main struggle with Eclass lies in the retrieval and saving of information on the servers where the Eclass information lies. The information needed to make the application run properly may live on a specific server, but is used on the individual machines of the users. There is a slowdown on the startup of Eclass, but running the application after retrieving all the necessary information is rather fast. Like startup, saving all the information back on the specified server presents another slowdown, with all users basically starting and saving at the same times. With increased capabilities in the used hardware, these problems can be minimized.




Previous: 2.7 | Next: 4 | Up: 3 | Top: Index