1 Chapter 7 Requirement Modeling flow, behavior, patterns and Webapps.
-
Upload
vernon-franklin -
Category
Documents
-
view
227 -
download
2
Transcript of 1 Chapter 7 Requirement Modeling flow, behavior, patterns and Webapps.
1
Chapter 7Chapter 7Requirement ModelingRequirement Modeling
flow, behavior, patterns and flow, behavior, patterns and WebappsWebapps
A RoadmapA Roadmap
Use-casesUse-cases Use-case diagramsUse-case diagrams Activity diagramsActivity diagrams Swimlane diagramsSwimlane diagrams
Data object diagrams ERD diagrams Data flow diagrams Process specifications
We are going to examine some of the key tools used for creating an analysis model.
General
Structured Analysis OO Analysis Class diagrams Packages CRC cards Sequence
Diagrams
These tools are not specific to either structured analysis or OO analysis.
Requirement Modeling Requirement Modeling StrategiesStrategies Structured AnalysisStructured Analysis
Data and processes defined in terms of attributes and relationshipsData and processes defined in terms of attributes and relationships Processes transform data as data objectsProcesses transform data as data objects
Flow oriented , behavioral models, special requirement Flow oriented , behavioral models, special requirement analysisanalysis
Who does it?Who does it? What are the steps?What are the steps? What are the work products?What are the work products? How do I ensure that I’ve done it right?How do I ensure that I’ve done it right?
3
4
Data ModelingData Modeling
examines data objects examines data objects independently of processingindependently of processing
focuses attention on the data focuses attention on the data domaindomain
creates a model at the customer’s creates a model at the customer’s level of abstractionlevel of abstraction
indicates how data objects relate to indicates how data objects relate to one anotherone another
5
What is a Data Object?What is a Data Object?
ObjectObject——something that is described by a setsomething that is described by a setof attributes (data items) and that will be of attributes (data items) and that will be manipulated within the software (system)manipulated within the software (system)
each each instanceinstanceof an object (e.g., a book) of an object (e.g., a book) can be identified uniquely (e.g., ISBN #) can be identified uniquely (e.g., ISBN #)
each plays a necessary role in the systemeach plays a necessary role in the systemi.e., the system could not function without i.e., the system could not function without access to instances of the objectaccess to instances of the objecteach is described by attributes that are each is described by attributes that are
themselves data itemsthemselves data items
6
Typical ObjectsTypical Objects
external entitiesexternal entities (printer, user, sensor)(printer, user, sensor)thingsthings (e.g, reports, displays, signals) (e.g, reports, displays, signals)
occurrences or eventsoccurrences or events (e.g., interrupt, alarm)(e.g., interrupt, alarm)rolesroles (e.g., manager, engineer, salesperson)(e.g., manager, engineer, salesperson)
organizational unitsorganizational units (e.g., division, team)(e.g., division, team)placesplaces (e.g., manufacturing floor) (e.g., manufacturing floor)
structuresstructures (e.g., employee record)(e.g., employee record)
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 7
Data Objects and Data Objects and AttributesAttributes
A data object contains a set of A data object contains a set of attributes that act as an aspect, attributes that act as an aspect, quality, characteristic, or descriptor of quality, characteristic, or descriptor of the objectthe objectobject: automobileobject: automobile
attributes:attributes: makemake modelmodel body typebody type priceprice options codeoptions code
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 8
What is a Relationship?What is a Relationship?
relationshiprelationship——indicates “connectedness”; indicates “connectedness”; a "fact" that must be "remembered" a "fact" that must be "remembered" by the system and cannot or is not computed by the system and cannot or is not computed or derived mechanicallyor derived mechanically
several instances of a relationship several instances of a relationship can existcan exist
objects can be related in many objects can be related in many different waysdifferent ways
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 9
ERD NotationERD Notation
(0, m) (1, 1)
objectobject objectobjectrelationshiprelationship11 22
One common form:One common form:
(0, m)(0, m)
(1, 1)(1, 1)
objectobject11 objectobject22relationshiprelationship
Another common form:Another common form:attributeattribute
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 10
Building an ERDBuilding an ERD
Level 1—model all data objects (entities) and Level 1—model all data objects (entities) and their “connections” to one anothertheir “connections” to one another
Level 2—model all entities and relationshipsLevel 2—model all entities and relationships Level 3—model all entities, relationships, Level 3—model all entities, relationships,
and the attributes that provide further depthand the attributes that provide further depth
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 11
The ERD: An ExampleThe ERD: An Example
(1,1)(1,1) (1,m)(1,m)placesplacesCustomerCustomer
requestrequestfor servicefor service
generatesgenerates (1,n)(1,n)
(1,1)(1,1)
workworkorderorder
workworktaskstasks
materialsmaterials
consistsconsistsofof
listslists
(1,1)(1,1)(1,w)(1,w)
(1,1)
(1,i)(1,i)
selectedselectedfromfrom
standardstandardtask tabletask table
(1,w)(1,w)
(1,1)(1,1)
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 12
Object-Oriented ConceptsObject-Oriented Concepts
Must be understood to apply class-based Must be understood to apply class-based elements of the analysis modelelements of the analysis model
Key concepts:Key concepts: Classes and objectsClasses and objects Attributes and operationsAttributes and operations Encapsulation and instantiationEncapsulation and instantiation InheritanceInheritance
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 13
ClassClasseses• object-oriented thinking begins with object-oriented thinking begins with
the definition of a the definition of a class,class, often often defined as:defined as:– templatetemplate– generalized descriptiongeneralized description– “ “blueprint” ... describing a collection of blueprint” ... describing a collection of
similar itemssimilar items• a a metaclassmetaclass (also called a (also called a superclasssuperclass) )
establishes a hierarchy of classesestablishes a hierarchy of classes• once a class of items is defined, a once a class of items is defined, a
specific instance of the class can be specific instance of the class can be identified identified
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 14
Building a Building a ClassClass
class name
attributes:
operations:
attributes:
operations
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 15
What is a What is a Class?Class?
external entities
things
occurrences roles
organizational units
places
structures
class name
attributes:
operations:
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 16
Encapsulation/Encapsulation/HidingHidingThe object encapsulates
both data and the logicalprocedures required tomanipulate the data
Achieves “information hiding”
method # 1
data
method # 2
method # 4
method # 5
method # 6
method # 3
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 17
Class Class HierarchyHierarchy
ChairTable Desk ”Chable"
instances of Chair
PieceOfFurniture (superclass)
subclasses of the
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 18
MethodsMethods(a.k.a. Operations, (a.k.a. Operations,
Services)Services)An executable procedure that is encapsulated in a class and is designed to operate on one or more data attributes that are defined as part of the class.A method is invoked via message passing.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 19
Scenario-Based ModelingScenario-Based Modeling
““[Use-cases] are simply an aid to defining what [Use-cases] are simply an aid to defining what exists outside the system (actors) and what exists outside the system (actors) and what should be performed by the system (use-cases).” should be performed by the system (use-cases).” Ivar JacobsonIvar Jacobson
(1) What should we write about?(1) What should we write about?
(2) How much should we write about it?(2) How much should we write about it?
(3) How detailed should we make our description? (3) How detailed should we make our description?
(4) How should we organize the description?(4) How should we organize the description?
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 20
Use-Use-CasesCases
a scenario that describes a “thread of a scenario that describes a “thread of usage” for a systemusage” for a system
actorsactors represent roles people or devices represent roles people or devices play as the system functionsplay as the system functions
usersusers can play a number of different roles can play a number of different roles for a given scenariofor a given scenario
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 21
Developing a Use-Developing a Use-CaseCase What are the main tasks or functions that are performed What are the main tasks or functions that are performed
by the actor?by the actor? What system information will the the actor acquire, What system information will the the actor acquire,
produce or change?produce or change? Will the actor have to inform the system about changes Will the actor have to inform the system about changes
in the external environment?in the external environment? What information does the actor desire from the system?What information does the actor desire from the system? Does the actor wish to be informed about unexpected Does the actor wish to be informed about unexpected
changes?changes?
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 22
Use-Case DiagramUse-Case Diagram
homeowner
Access camera surveillance via the
Internet
Configure SafeHome system parameters
Set alarm
cameras
SafeHome
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 23
Activity DiagramActivity DiagramSupplements the use-case by providing a diagrammatic Supplements the use-case by providing a diagrammatic representation of procedural flowrepresentation of procedural flow
enter password and user ID
select major function
valid passwords/ ID
prompt for reentry
invalid passwords/ ID
input tries remain
no inputtries remain
select surveillance
other functions may also be
selected
thumbnail views select a specif ic camera
select camera icon
prompt for another view
select specific camera - thumbnails
exit this function see another camera
view camera output in labelled window
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 24
Swimlane DiagramsSwimlane DiagramsAllows the modeler to represent the flow of activities described by the use-case Allows the modeler to represent the flow of activities described by the use-case and at the same time indicate which actor (if there are multiple actors involved and at the same time indicate which actor (if there are multiple actors involved in a specific use-case) or analysis class has responsibility for the action in a specific use-case) or analysis class has responsibility for the action described by an activity rectangledescribed by an activity rectangle
enter password and user ID
select major function
valid passwords/ ID
prompt for reentry
invalidpasswords/ ID
input tries
remain
no input
tries remain
select surveillance
other functions may also be
selected
thumbnail views select a specif ic camera
select camera icon
generate video output
select specific camera - thumbnails
exit thisfunction
see
anothercamera
homeowner c amera int erf ac e
prompt foranother view
view camera output in labelled window
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 25
Flow-Oriented Flow-Oriented ModelingModeling
Represents how data objects are transformed at Represents how data objects are transformed at they move through the systemthey move through the system
A A data flow diagram (DFD)data flow diagram (DFD) is the diagrammatic is the diagrammatic form that is usedform that is used
Considered by many to be an ‘old school’ Considered by many to be an ‘old school’ approach, flow-oriented modeling continues to approach, flow-oriented modeling continues to provide a view of the system that is unique—it provide a view of the system that is unique—it should be used to supplement other analysis should be used to supplement other analysis model elementsmodel elements
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 26
The Flow ModelThe Flow ModelEvery computer-based system is an Every computer-based system is an information transform ....information transform ....
computercomputerbasedbased
systemsysteminputinput outputoutput
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 27
Flow Modeling NotationFlow Modeling Notation
external entityexternal entity
processprocess
data flowdata flow
data storedata store
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 28
External EntityExternal Entity
A producer or consumer of dataA producer or consumer of data
Examples: a person, a device, a sensorExamples: a person, a device, a sensor
Another example: computer-basedAnother example: computer-basedsystemsystem
Data must always originate somewhereData must always originate somewhereand must always be sent to somethingand must always be sent to something
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 29
ProcessProcess
A data transformer (changes inputA data transformer (changes inputto output)to output)
Examples: compute taxes, determine area,Examples: compute taxes, determine area,format report, display graph format report, display graph
Data must always be processed in some Data must always be processed in some way to achieve system functionway to achieve system function
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 30
Data FlowData Flow
Data flows through a system, beginningData flows through a system, beginningas input and be transformed into output.as input and be transformed into output.
computecomputetriangle triangle
areaarea
basebase
heightheight
areaarea
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 31
Data StoresData Stores
DataData is often stored for later use.is often stored for later use.
look-uplook-upsensorsensor
datadata
sensor #sensor #
report requiredreport required
sensor #, type, sensor #, type, location, agelocation, age
sensor datasensor data
sensor numbersensor number
type, type, location, agelocation, age
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 32
Data Flow Diagramming:Data Flow Diagramming:GuidelinesGuidelines
all icons must be labeled with all icons must be labeled with meaningful namesmeaningful names
the DFD evolves through a number of the DFD evolves through a number of levels of detaillevels of detail
always begin with a context level always begin with a context level diagram (also called level 0)diagram (also called level 0)
always show external entities at level always show external entities at level 00
always label data flow arrowsalways label data flow arrows do not represent procedural logicdo not represent procedural logic
Data Flow DiagramsData Flow Diagrams
Models data elements Attributes Relationships
Models processes that transform data
Structured Analysis:
Data object diagrams ERD diagramsmodeled
using Data flow diagram Process narrativemodeled
using
A data flow diagram describes information flow among a set of processes and actors.
A process narrative describes how a single process transforms input data to output data.
Modeling Tools:
1
*
Data ObjectsData Objects
Plays a necessary rolePlays a necessary role Characterized by attributesCharacterized by attributes Uniquely identifiable (?)Uniquely identifiable (?)
RolesRoles EventsEvents PlacesPlaces
A data object is a domain element that will be manipulated by the system.
Characteristics: Examples: External entities Structures Other things
Object: car
Attributes:• ID #• Make• Model• Price
Modeling
Relationships, Cardinality, Relationships, Cardinality, ModalityModality
CardinalityCardinality Defines the number of items Defines the number of items
on either end of a connectionon either end of a connection
Relationships Define connections between
objects
Modality Defines the necessity of a
connection
Person
Car
ownsinsured
11
**
Trailer
attached
1
1
Entity-Relationship Diagram (ERD)
DFD: A Basic ExampleDFD: A Basic Example
SafeHomesoftware
SafeHomesoftware
Controlpanel
Controlpanel
SensorsSensors
Paneldisplay
Paneldisplay
AlarmAlarm
Telephoneline
Telephoneline
commandsand data
sensorstatus
displayinformation
telephonetones
alarmtype
External entities(squares)
Data flows(directed edges)
Processes
(circles)
Notice that the system is represented as a single bubble.This is known as a level 0 DFD, or a context diagram.
DFDs and Progressive DFDs and Progressive RefinementRefinement
Each DFD reveals progressively more detail than the DFD that preceded it.
Level 1 DFD:
Interactwith user
Interactwith user
Controlpanel
Controlpanel
commandsand data Configure
system
Configuresystem
Configurerequest
Activate /deactivate
system
Activate /deactivate
system
Start/stoprequest
Processpassword
Processpassword
…
password …
…
Refinement continues until each bubble can be (easily) implemented as a program module.
Process NarrativeProcess Narrative
Processpassword
Processpassword
password
…
…
A process specification describes all of the flow processes in the final (most detailed) DFD.
A process specification can be represented as a collection of process narratives.
“The process password transform performs password validation at the control panel for the SafeHome security function. Process password receives a four-digit password from the interact with user function. The password is first compared to the master password stored within the system …”
How are DFDs Constructed?How are DFDs Constructed?Grammatical
parse
Developprocess
narratives
Level 0 DFD
Scopedocument
Grammaticalparse
Next level DFD
(nouns = external entities, data/control objects, data stores)(verbs = processes)
Note that nouns and verbs are associated with one another.
Some GuidelinesSome Guidelines
Level 0 DFD should contain only a single Level 0 DFD should contain only a single bubblebubble
All arrows and bubbles should be All arrows and bubbles should be meaningfully labeledmeaningfully labeled
Refinement begins by isolating next level Refinement begins by isolating next level processes, data objects, and data storesprocesses, data objects, and data stores
Refine only one bubble at a timeRefine only one bubble at a time
Data flow continuity must be maintained Data flow continuity must be maintained between levelsbetween levels
Let’s Try it Out!Let’s Try it Out!
The video library management system will interact with the user through a web-based browser interface. When the user logs into the system, the system will determine the user’s access privileges based on the user configuration database. If the user is an administrator, the system will allow the user to enter new movie titles, new actor information, etc. If the user is not an administrator, the system will allow the user to query the system based on movie title, actor, director, etc.
The Video Library Management System
What might the level 0 DFD look like? Level 1?
An excerpt from the scope document:
And a Bit of ReviewAnd a Bit of Review
The system will allow the user to store a number of information elements with each video, director, and actor. Each video will be characterized by a title, a genre descriptor, a short synopsis, a list of directors, a list of actors, a rating, and a UPC code. Each actor and director will be characterized by a first and last name, a year of birth, and a brief biography. When the user is viewing a video entry, they will be able to retrieve the full actor (or director) information by clicking the actor’s (or director’s) name.
Another excerpt from the scope document:
What would be an appropriate ERD diagram for this excerpt?
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 43
Constructing a DFD—IConstructing a DFD—I
review the data model to isolate data review the data model to isolate data objects and use a grammatical parse to objects and use a grammatical parse to determine “operations”determine “operations”
determine external entities (producers determine external entities (producers and consumers of data)and consumers of data)
create a level 0 DFDcreate a level 0 DFD
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 44
Level 0 DFD ExampleLevel 0 DFD Example
useruserprocessing processing
requestrequest
videovideosourcesource HDTVHDTV
video signalvideo signal
digitaldigitalvideovideo
processorprocessor
requestedrequestedvideovideosignalsignal
monitormonitor
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 45
Constructing a DFD—IIConstructing a DFD—II
write a narrative describing the write a narrative describing the transformtransform
parse to determine next level parse to determine next level transformstransforms
““balance” the flow to maintain data balance” the flow to maintain data flow continuityflow continuity
develop a level 1 DFDdevelop a level 1 DFD use a 1:5 (approx.) expansion ratiouse a 1:5 (approx.) expansion ratio
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 46
The Data Flow HierarchyThe Data Flow Hierarchy
PPaa bbxx yy
p1p1p2p2
p3p3p4p4 55
aa
bb
cc
ddee
ff
gg
level 0level 0
level 1level 1
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 47
Flow Modeling NotesFlow Modeling Notes
each bubble is refined until it does each bubble is refined until it does just one thingjust one thing
the expansion ratio decreases as the the expansion ratio decreases as the number of levels increasenumber of levels increase
most systems require between 3 and most systems require between 3 and 7 levels for an adequate flow model7 levels for an adequate flow model
a single data flow item (arrow) may a single data flow item (arrow) may be expanded as levels increase (data be expanded as levels increase (data dictionary provides information)dictionary provides information)
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 48
Process Specification Process Specification (PSPEC)(PSPEC)
PSPECPSPEC
narrativenarrativepseudocode (PDL)pseudocode (PDL)
equationsequationstablestables
diagrams and/or chartsdiagrams and/or charts
bubblebubble
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 49
Maps intoMaps into
DFDs: A Look AheadDFDs: A Look Ahead
analysis modelanalysis model
design modeldesign model
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 50
Control Flow DiagramsControl Flow Diagrams
Represents “Represents “eventsevents” and the processes that ” and the processes that manage eventsmanage events
An “event” is a Boolean condition that can be An “event” is a Boolean condition that can be ascertained by:ascertained by:
listing all sensors that are "read" by the software.listing all sensors that are "read" by the software. listing all interrupt conditions.listing all interrupt conditions. listing all "switches" that are actuated by an operator.listing all "switches" that are actuated by an operator. listing all data conditions.listing all data conditions. recalling the noun/verb parse that was applied to the recalling the noun/verb parse that was applied to the
processing narrative, review all "control items" as possible processing narrative, review all "control items" as possible CSPEC inputs/outputs.CSPEC inputs/outputs.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 51
The Control The Control ModelModelthe control flow diagram is "superimposed" on the DFD the control flow diagram is "superimposed" on the DFD
and shows events that control the processes noted in and shows events that control the processes noted in the DFDthe DFD
control flows—events and control items—are noted by control flows—events and control items—are noted by dashed arrowsdashed arrows
a vertical bar implies an input to or output from a control a vertical bar implies an input to or output from a control spec (CSPEC) — a separate specification that spec (CSPEC) — a separate specification that describes how control is handleddescribes how control is handled
a dashed arrow entering a vertical bar is an input to the a dashed arrow entering a vertical bar is an input to the CSPECCSPEC
a dashed arrow leaving a process implies a data a dashed arrow leaving a process implies a data conditioncondition
a dashed arrow entering a process implies a control a dashed arrow entering a process implies a control input read directly by the processinput read directly by the process
control flows do not physically activate/deactivate the control flows do not physically activate/deactivate the processes—this is done via the CSPECprocesses—this is done via the CSPEC
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 52
Control Flow Control Flow DiagramDiagram
read operator
input manage copying
reload process
perform problem
diagnosis
create user
displays
empty
jammed
full
display panel enabled
beeper on/off
start
problem light
copies done
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 53
Control Specification Control Specification (CSPEC)(CSPEC)
The CSPEC can be:The CSPEC can be:
state diagram state diagram (sequential spec)(sequential spec)
state transition tablestate transition table
decision tables decision tables
activation tablesactivation tables
combinatorial speccombinatorial spec
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 54
Guidelines for Building a Guidelines for Building a CSPECCSPEClist all sensors that are "read" by the softwarelist all sensors that are "read" by the software
list all interrupt conditionslist all interrupt conditions
list all "switches" that are actuated by the operatorlist all "switches" that are actuated by the operator
list all data conditionslist all data conditions
recalling the noun-verb parse that was applied to therecalling the noun-verb parse that was applied to thesoftware statement of scope, review all "control items"software statement of scope, review all "control items"
as possible CSPEC inputs/outputsas possible CSPEC inputs/outputs
describe the behavior of a system by identifying its describe the behavior of a system by identifying its states; identify how each state is reach and defines states; identify how each state is reach and defines
the transitions between statesthe transitions between states
focus on possible omissions ... a very common error in focus on possible omissions ... a very common error in specifying control, e.g., ask: "Is there any other way I specifying control, e.g., ask: "Is there any other way I can get to this state or exit from it?"can get to this state or exit from it?"
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 55
Class-Based ModelingClass-Based Modeling Identify analysis classes by examining the Identify analysis classes by examining the
problem statementproblem statement Use a “grammatical parse” to isolate Use a “grammatical parse” to isolate
potential classespotential classes Identify the attributes of each classIdentify the attributes of each class Identify operations that manipulate the Identify operations that manipulate the
attributesattributes
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 56
Analysis ClassesAnalysis Classes External entitiesExternal entities (e.g., other systems, devices, people) that produce or (e.g., other systems, devices, people) that produce or
consume information to be used by a computer-based system.consume information to be used by a computer-based system. ThingsThings (e.g, reports, displays, letters, signals) that are part of the (e.g, reports, displays, letters, signals) that are part of the
information domain for the problem.information domain for the problem. Occurrences or eventsOccurrences or events (e.g., a property transfer or the completion of a (e.g., a property transfer or the completion of a
series of robot movements) that occur within the context of system series of robot movements) that occur within the context of system operation.operation.
RolesRoles (e.g., manager, engineer, salesperson) played by people who (e.g., manager, engineer, salesperson) played by people who interact with the system.interact with the system.
Organizational unitsOrganizational units (e.g., division, group, team) that are relevant to an (e.g., division, group, team) that are relevant to an application.application.
PlacesPlaces (e.g., manufacturing floor or loading dock) that establish the (e.g., manufacturing floor or loading dock) that establish the context of the problem and the overall function of the system.context of the problem and the overall function of the system.
StructuresStructures (e.g., sensors, four-wheeled vehicles, or computers) that (e.g., sensors, four-wheeled vehicles, or computers) that define a class of objects or related classes of objects.define a class of objects or related classes of objects.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 57
Selecting Classes—Selecting Classes—CriteriaCriteria
needed servicesneeded services
multiple attributesmultiple attributes
common attributescommon attributes
common operationscommon operations
essential requirementsessential requirements
retained informationretained information
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 58
Class DiagramClass DiagramSystem
program() display() reset() query() modify() call()
systemID verificationPhoneNumber systemStatus delayTime telephoneNumber masterPassword temporaryPassword numberTries
Class name
attributes
operations
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 59
Class DiagramClass DiagramFloorPlan
determineType () positionFloorplan scale() change color()
type name outsideDimensions
Camera
determineType () translateLocation () displayID() displayView() displayZoom()
type ID location fieldView panAngle ZoomSetting
WallSegment
type startCoordinates stopCoordinates nextWallSement
determineType () draw()
Window
type startCoordinates stopCoordinates nextWindow
determineType () draw()
is placed within
Wall
type wallDimensions
determineType () computeDimensions ()
Door
type startCoordinates stopCoordinates nextDoor
determineType () draw()
is part of
is used to buildis used to build
is used to build
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 60
CRC ModelingCRC Modeling
Analysis classes have “responsibilities”Analysis classes have “responsibilities” ResponsibilitiesResponsibilities are the attributes and operations are the attributes and operations
encapsulated by the classencapsulated by the class Analysis classes collaborate with one anotherAnalysis classes collaborate with one another
CollaboratorsCollaborators are those classes that are required to are those classes that are required to provide a class with the information needed to complete provide a class with the information needed to complete a responsibility. a responsibility.
In general, a collaboration implies either a request for In general, a collaboration implies either a request for information or a request for some action.information or a request for some action.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 61
CRC CRC ModelingModeling
Class:
Description:
Responsibility: Collaborator:
Class:
Description:
Responsibility: Collaborator:
Class:
Description:
Responsibility: Collaborator:
Class: FloorPlan
Description:
Responsibility: Collaborator:
incorporates walls, doors and windows
shows position of video cameras
defines floor plan name/type
manages floor plan positioning
scales floor plan for display
scales floor plan for display
Wall
Camera
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 62
Class TypesClass Types Entity classesEntity classes, also called, also called model model or or businessbusiness classes, are classes, are
extracted directly from the statement of the problem (e.g., extracted directly from the statement of the problem (e.g., FloorPlan and Sensor). FloorPlan and Sensor).
Boundary classesBoundary classes are used to create the interface (e.g., are used to create the interface (e.g., interactive screen or printed reports) that the user sees and interactive screen or printed reports) that the user sees and interacts with as the software is used. interacts with as the software is used.
Controller classesController classes manage a “unit of work” [UML03] from manage a “unit of work” [UML03] from start to finish. That is, controller classes can be designed to start to finish. That is, controller classes can be designed to manage manage
the creation or update of entity objects; the creation or update of entity objects; the instantiation of boundary objects as they obtain information the instantiation of boundary objects as they obtain information
from entity objects; from entity objects; complex communication between sets of objects; complex communication between sets of objects; validation of data communicated between objects or between the validation of data communicated between objects or between the
user and the application. user and the application.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 63
ResponsibilitiesResponsibilities
System intelligence should be distributed across System intelligence should be distributed across classes to best address the needs of the problemclasses to best address the needs of the problem
Each responsibility should be stated as generally Each responsibility should be stated as generally as possibleas possible
Information and the behavior related to it should Information and the behavior related to it should reside within the same classreside within the same class
Information about one thing should be localized Information about one thing should be localized with a single class, not distributed across with a single class, not distributed across multiple classes.multiple classes.
Responsibilities should be shared among related Responsibilities should be shared among related classes, when appropriate. classes, when appropriate.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 64
CollaborationsCollaborations
Classes fulfill their responsibilities in one of two ways:Classes fulfill their responsibilities in one of two ways: A class can use its own operations to manipulate its own attributes, A class can use its own operations to manipulate its own attributes,
thereby fulfilling a particular responsibility, or thereby fulfilling a particular responsibility, or a class can collaborate with other classes.a class can collaborate with other classes.
Collaborations identify relationships between classesCollaborations identify relationships between classes Collaborations are identified by determining whether a class can Collaborations are identified by determining whether a class can
fulfill each responsibility itselffulfill each responsibility itself three different generic relationships between classes [WIR90]: three different generic relationships between classes [WIR90]:
the the is-part-ofis-part-of relationshiprelationship the the has-knowledge-ofhas-knowledge-of relationship relationship the the depends-upondepends-upon relationshiprelationship
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 65
Composite Aggregate Composite Aggregate ClassClass
Player
PlayerHead PlayerArms PlayerLegsPlayerBody
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 66
Reviewing the CRC ModelReviewing the CRC Model All participants in the review (of the CRC model) are given a subset of the CRC All participants in the review (of the CRC model) are given a subset of the CRC
model index cards.model index cards. Cards that collaborate should be separated (i.e., no reviewer should have two cards that Cards that collaborate should be separated (i.e., no reviewer should have two cards that
collaborate).collaborate). All use-case scenarios (and corresponding use-case diagrams) should be organized All use-case scenarios (and corresponding use-case diagrams) should be organized
into categoriesinto categories.. The review leader reads the use-case deliberatelyThe review leader reads the use-case deliberately..
As the review leader comes to a named object, she passes a token to the person holding As the review leader comes to a named object, she passes a token to the person holding the corresponding class index card.the corresponding class index card.
When the token is passed, the holder of the class card is asked to describe the When the token is passed, the holder of the class card is asked to describe the responsibilities noted on the cardresponsibilities noted on the card..
The group determines whether one (or more) of the responsibilities satisfies the use-The group determines whether one (or more) of the responsibilities satisfies the use-case requirement.case requirement.
If the responsibilities and collaborations noted on the index cards cannot If the responsibilities and collaborations noted on the index cards cannot accommodate the use-case, modifications are made to the cardsaccommodate the use-case, modifications are made to the cards..
This may include the definition of new classes (and corresponding CRC index cards) or This may include the definition of new classes (and corresponding CRC index cards) or the specification of new or revised responsibilities or collaborations on existing cards.the specification of new or revised responsibilities or collaborations on existing cards.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 67
Associations and Associations and DependenciesDependencies
Two analysis classes are often related to one Two analysis classes are often related to one another in some fashionanother in some fashion In UML these relationships are called In UML these relationships are called associationsassociations Associations can be refined by indicatingAssociations can be refined by indicating multiplicitymultiplicity
(the term (the term cardinalitycardinality is used in data modelingis used in data modeling In many instances, a client-server relationship In many instances, a client-server relationship
exists between two analysis classes. exists between two analysis classes. In such cases, a client-class depends on the server-class In such cases, a client-class depends on the server-class
in some way and a in some way and a dependency relationshipdependency relationship is is establishedestablished
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 68
MultiplicityMultiplicity
WallSegment Window Door
Wall
is used to buildis used to build
is used to build1..*
1 1 1
0..* 0..*
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 69
DependenciesDependencies
CameraDisplayWindow
{password}
<<access>>
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 70
Analysis PackagesAnalysis Packages
Various elements of the analysis model (e.g., use-Various elements of the analysis model (e.g., use-cases, analysis classes) are categorized in a cases, analysis classes) are categorized in a manner that packages them as a groupingmanner that packages them as a grouping
The plus sign preceding the analysis class name The plus sign preceding the analysis class name in each package indicates that the classes have in each package indicates that the classes have public visibility and are therefore accessible from public visibility and are therefore accessible from other packages.other packages.
Other symbols can precede an element within a Other symbols can precede an element within a package. A minus sign indicates that an element package. A minus sign indicates that an element is hidden from all other packages and a # symbol is hidden from all other packages and a # symbol indicates that an element is accessible only to indicates that an element is accessible only to packages contained within a given package.packages contained within a given package.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 71
Analysis PackagesAnalysis Packages
Environment
+Tree+Landscape+Road+Wall+Bridge+Building+VisualEffect+Scene
Characters
+Player+Protagonist+Antagonist+SupportingRole
RulesOfTheGame
+RulesOfMovement+ConstraintsOnAction
package name
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 72
Behavioral ModelingBehavioral Modeling
The behavioral model indicates how software will respond The behavioral model indicates how software will respond to external events or stimuli. To create the model, the to external events or stimuli. To create the model, the analyst must perform the following steps:analyst must perform the following steps:
Evaluate all use-cases to fully understand the sequence of Evaluate all use-cases to fully understand the sequence of interaction within the system.interaction within the system.
Identify events that drive the interaction sequence and Identify events that drive the interaction sequence and understand how these events relate to specific objects.understand how these events relate to specific objects.
Create a sequence for each use-case.Create a sequence for each use-case. Build a state diagram for the system.Build a state diagram for the system. Review the behavioral model to verify accuracy and consistency.Review the behavioral model to verify accuracy and consistency.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 73
State RepresentationsState Representations
In the context of behavioral modeling, two different In the context of behavioral modeling, two different characterizations of states must be considered: characterizations of states must be considered: the state of each class as the system performs its function the state of each class as the system performs its function
andand the state of the system as observed from the outside as the the state of the system as observed from the outside as the
system performs its functionsystem performs its function The state of a class takes on both passive and active The state of a class takes on both passive and active
characteristics [CHA93]. characteristics [CHA93]. A A passive statepassive state is simply the current status of all of an is simply the current status of all of an
object’s attributes.object’s attributes. The The active stateactive state of an object indicates the current status of of an object indicates the current status of
the object as it undergoes a continuing transformation or the object as it undergoes a continuing transformation or processing. processing.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 74
State Diagram for the ControlPanel State Diagram for the ControlPanel ClassClass
reading
locked
selecting
password entered
comparing
password = incorrect & numberOfTries < maxTries
password = correct
activation successful
key hit
do: validatePassword
numberOfTries > maxTries
timer < lockedTime
timer > lockedTime
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 75
The States of a SystemThe States of a System statestate—a set of observable circum-—a set of observable circum-
stances that characterizes the stances that characterizes the behavior of a system at a given timebehavior of a system at a given time
state transitionstate transition—the movement —the movement from one state to anotherfrom one state to another
eventevent—an occurrence that causes —an occurrence that causes the system to exhibit some the system to exhibit some predictable form of behaviorpredictable form of behavior
actionaction—process that occurs as a —process that occurs as a consequence of making a transitionconsequence of making a transition
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 76
Behavioral ModelingBehavioral Modeling
make a list of the different states of a make a list of the different states of a system (How does the system system (How does the system behave?)behave?)
indicate how the system makes a indicate how the system makes a transition from one state to another transition from one state to another (How does the system change state?)(How does the system change state?) indicate eventindicate event indicate actionindicate action
draw a draw a state diagram or a sequence state diagram or a sequence diagramdiagram
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 77
Sequence DiagramSequence Diagram
homeowner control panel sensorssystem sensors
system ready
reading
request lookupcomparing
result
password entered
password = correctrequest activation
activation successful
lockednumberOfTries > maxTries
selecting
timer > lockedTimeA
A
Figure 8.27 Sequence diagram (partial) for SafeHome security function
activation successful
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 78
Writing the Software Writing the Software SpecificationSpecification
Everyone knew exactly what had to be done until someone wrote it down!
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 79
Specification Specification GuidelinesGuidelinesuse a layered format that provides increasing detail
as the "layers" deepen use consistent graphical notation and apply textual terms consistently (stay away from aliases) be sure to define all acronyms be sure to include a table of contents; ideally, include an index and/or a glossary write in a simple, unambiguous style (see "editing suggestions" on the following pages) always put yourself in the reader's position, "Would I be able to understand this if I wasn't intimately familiar with the system?"
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 80
Specification Specification GuidelinesGuidelinesBe on the lookout for persuasive connectors, ask why?
keys: certainly, therefore, clearly, obviously, it follows that ... Watch out for vague terms keys: some, sometimes, often, usually,ordinarily, most, mostly ... When lists are given, but not completed, be sure all items are understood keys: etc., and so forth, and so on, such as Be sure stated ranges don't contain unstated assumptions e.g., Valid codes range from 10 to 100. Integer? Real? Hex? Beware of vague verbs such as handled, rejected, processed, ... Beware "passive voice" statements e.g., The parameters are initialized. By what? Beware "dangling" pronouns e.g., The I/O module communicated with the data validation module and its contol flag is set. Whose control flag?
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 81
Specification Specification GuidelinesGuidelines
When a term is explicitly defined in one place, try substituting the definition forother occurrences of the term When a structure is described in words, draw a picture When a structure is described with a picture, try to redraw the picture to emphasize different elements of the structure When symbolic equations are used, try expressing their meaning in words When a calculation is specified, work at least two examples Look for statements that imply certainty, then ask for proof keys; always, every, all, none, never Search behind certainty statements—be sure restrictions or limitations are realistic