0% found this document useful (0 votes)
42 views138 pages

S.E Ese Notes

Uploaded by

Alester
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
42 views138 pages

S.E Ese Notes

Uploaded by

Alester
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 138
© 9 Cf sesiogeckiomtitiamensnwerngmauremenscictatoy ‘ ~ Chieaton of tears year Piet ox 2 Worheretoseae ‘gorthre ntervaw Pepoation Dafa Science Topic-wie Pcie Cas Joa Pyhon ead Diets Procice Video Count 120 + Detaled investigation of user needs straints for system development + Derinotne Requirements elicitation Methods ‘There area number of requirements eicstation methods, Few of thom ar sted below- 1 Interviews 2. Brainstorming Sessions 4 Faciltated Application Specification Technique 4. Quality Function Deployment (QFO) 5. Use Case Approach asm) The success ofan elicitation technique used depends onthe maturity ofthe analyst, developers, users, ana the customer involves ing JavaScript Machine” => Deu SESE AT ET ~ aad Giecas Procice Video Court a0 2. Brainstorming Sessions + Itisa group technique ‘over Stop Regular Heath Check Up + Itsintendedto generate lots of new ideas hence providing platform toshare views 2 * veneers CI AAT ‘+ sAhighy trained faclitatoris required to handle group bias and group confi. Every ideas documented so that everyone can see Finally, a documents prepared which consists of the st ofrequlrements and their priority it possible Deu 4. Facilitated Application Specification Technique: nea recunavoer It's objective Isto bridge the expectation gap diference between what the ‘ovetopers think they are supposed to bull ana what customersthink they are going toget. ‘Ateam oriented approachis develope for requirements gathering, Eacnattendee asked to meke alist of objects that are 1. Partof he environment that surcoundsthe systom 2. Produced uy ne system P Workeretoseae e7¢ teGEam DSA OataStuctwer Sgorthos Interv Peportion DalaSéiance Topicwie Posie Che fora Python Compete Programming JovScript Machine > ~ aad Giese Procice Video Cours a0 3. Facltated Application Specification Technique It's objectives te bridge the expectation gap-aifarence between what the (ogee. _Ateam oriented approach's developed for requirements gathering, 6 achattendee ached to make alist of objects thatare Soin 1. Partof the enviranment that surrounds the system ones 2. Produced ty the system 3. Uses bythe system ach participant prepares his/her ist, citterent sts are then combined, redundant {entries are eliminated, team i vided into smaller sub-teams to develop min =pectieations ana nally drat of specification is writencowun using all the inputs from the mestng 4. Quality Function Deployment: In this technique customer satistaction|s of prime concern, ence it emphasizes on the requirements whichatevaluabe athe customer P Workeretoseae e7¢ teGEam DSA OataStuctwer Sgorthos Interv Peportion DalaSéiance Topicwie Posie Che fora Python Compete Programming JovScript Machine > ~ aad Giese Procice Video Cours a0 ei . 4. Quality Function Deployment: In thie technique customer satistaction\s of prime cancer, a arc the requirements which are valualeta the customer. Cia) Stypesofroqurementsare identitied~ emphasizes on + Normal requirements ~ nth tne objective ana goats of the proposed sortware are ascussed with he customer, Example ~ normal requiements for aesutt management system may be enry of math, calculation of results, ee Expected requirements — ‘These requirements are co obvious thatthe customer need not expicly state thor. Example - protection from unauthorized access Exciting requirements includes features that are beyond customer's expectations and prove to be very P Workeretoseae e7¢ teGEam DSA OataStuctwer Sgorthes Interv Peportion DataSciance Topicwie Proce Che fora Python Compete Programming JovScript Machine > ~ aad Giese Procice Video Couns a0 ‘vor eeu 4. Quality Function Deployment: In thistechnique customer satistaction|s of prime concern, hence it emphasizes on ez the requirements which ate valuable tothe customer Stypesofrequlrementsare ientitied~ + Normal requirements ~ Inthis tne adjective ans gosto he proposed srtware are sscussed with the BOO customer, Example ~noxmal requitements fora esult management system may Cia) be entry of marks, calculation of results, et + Expected: ‘These requirements are so obvious that the customer need not expily state thor. Example - protection from unauthorized access + Exciting requirements = Itinctues teatures that are beyond customer's expectations and prove oe very satisying when present. Example ~ when unauthorized access detected, ‘houla backup ana shutdown ail processes ‘The major steps invotvodin this procedure are~ P Workeretoseae e7¢ teGEam DSA OataStuctwer Sgorthes Interv Peportion DataSciance Topicwie Proce Che fora Python Compete Programming JovScript Machine > ~ Read Disewse Practice Video Courses ae Bons arc Cia) ‘The major steps involvedin this procedure are - 4. Identify athe stakeholders, eg, Users, developers, customers ee 2. List out all requirements tom customer 5. Aalue indicating degree oF importance is assgnes to each requirement. ‘4. Inthe end the tna isto coquirementsiscategortzed as ~ + rtispossioietoachiove + ltshould be deterred and the reason frit + ttistmpossibieto achieve and should be dropped ott 5. Use Case Approach: P Workeretoseae e7¢ teGEam DSA OataStuctwer Sgorthes Interv Peportion DataSciance Topicwie Proce Che fora Python Compete Programming JovScript Machine > ~ aad Giese Procice Video Count a0 The majrstes involvedin this procedure are~ 4. Avalue indicating degree of importance s assigned to each requirement 1-ldentiyall he stakeholders, 69 Us ‘Inthe end the tna ist of requtrementsis categorized as~ + Itispossiotetoachieve arc + ttshoute be aeterred and tho reason frit cet] + t1istmpossititoaeniove and should be dropped ott 5. Uso Case Approsch: This technique combines text and pictures to provide a beter understanding ofthe requirements, The use cases describe the ‘what, of system and not how Mence, they ony lve functional view of the system, The components ofthe usecase design includes three major things ~ Actor, Use «cases, use case diagram, 1 Aetor= P Workeretoseae e7¢ teGEam DSA OataStuctwer Sgorthes Interv Peportion DataSciance Topicwie Proce Che fora Python Compete Programming JovScript Machine > ~ Seod Discs Protce Video Coutes oe 7 Tehoutd be deferred and the reason frit exmeo + Itsimpoteble to senieve and shouldbe dropped att «ecu tepec Ge This technique combines text and pictures to providea beter understanding ofthe requirements, > ‘Te use cases deseibe the what, ofa system and not‘now Hence, they ony givea See Tunetiona view ofthe system, aren The components ofthe usecase design includes three major things ~ Actor, Use cases, usecase diagram, 1 Aetor= It the external agent that les outside the system but inte way. Ansetor maybe. person, machin ee. ile represantac ae etik gure ‘Actors can be primary actors or secondary actors, ‘+ Primary actors lt requires assistance from the system te achieve a goa '+ Secondary actor It isan actor from which the system nec 2.Uge eases - P Workeretoseae SSIES KERN a 1} | ‘view Praporation Data TopicwinePratce Ci+ Jove Python Campeliveregramming JvaScipt MactneLeating SDE Sh Pusies GFGSchoo! Price >” ead Giecas Procice Video a0 a vol ince Pracice ViduoCouree | migTECheuque comaies text ano pitures Yo provae a peter unoerstanoing or ne requirements, ox ‘Te use cases deceibe the what, of system and notnow Hence, they ony give ita functional view of the systom, The components ofthe usecase design includes three major things ~ Actor, Use cases, usecase diagram, Book An 1 Aetor- Book An Offline Ite the external agent that les outside the ystem put intersct with tin some Offline a ‘way. Anactor maybe. person, machine etc. is represented asa stick gure. Session Actors can be primary actors or secondary actors. Today ‘+ Primary actors It requires assistance from the ystem te achieve a goal. Today Whingto ara ‘+ Secondary actor It isan ator from which the system neadsasestance. Taking ae 2.Use eases - They describe the sequence o interactions between actors and the system. They capture whnactors) do what(interaction} withthe system, Acomplete set of use cases specifies all possible way fuse the system =~ 2. Use case diagram == ‘Ase case dlaaram arachically renresentswhal happens when an actor interacts P Workeretoseae SERRATE! — on « re : ‘view Praporation Data TopicwinePrstce Cs+ Jove Python CampaltiveFrgrarmiag JowaScrpt MochneLoaming SDEShes! Purdes GFGSchosl Proce >” > ee eee ‘ ‘+ Secondary actor It san actor from which the system naadsasestance. ad 2,Use casos ~ ‘They describe the sequence ot interactions between actors andthe system. They Hyderabad to capture wno(actors) do what(interaction) with the system, Acomplete set of use Visakhapatnam cases specifies ll possible ways use the system 2. Use ease diagram — from RS7738 ‘use cate disgram graphically represents what happens when an actor interacts == with system. it captures the functional aspect at he system ‘+ Astick figure is used to represent an actor + Anovalisused to represent use case, + Atineis uses to representa relationship between anactorand ause case Mysore to Gos For more information on use case diagram, reer to Designing ise Cases tora Praject from Rs5.659 P Workeretoseae SEER oreo eee Bowie ‘Stor noteonsonware ttn in sotwareEagneetng =X QS ry pees Prototyping 5 : +The process in which developers create a model af the actual software + The intention behind creating this model isto get the actual teeter requirements more deeply rom user. + Prototyping help a lot in getting the feedback from the a imei customer ‘scfm ae ea Prototyping in Software Engineering with Example | hind / Urde fy Sa rea a ve SRST oreo eee 300 = Bioiiie ‘Stor noteonsonware ttn in sotwareEagneetng =X QS £ (Osmm ty Acne Vy Process of software prototyping 1. Initial raquirementsentifestion 2. Prototype development Soe eng on f ese = Rig Dies cigeoengentanie nia op herent a ve a SRST oreo e9¢@ Diodise Horie cnsohwaerepagiesatwaeEnpmeeG XQ) & rs pees Types of prototyping 5 ad 1. Rapid Prototyping/Throwaway In this type we bud» prototype with very tle efforts to get the requrements from the customer aftr geting the requirements we throwaway this prototype and start building the actual eer pes 2. yolutionary Prototyping: The prototype on the top af ean peti ns which we can Build the whole actual system. poten ‘scfm ae ea Prototyping in Software E ering with Exemple | hindi Urdu fy Sa rea a ve e5¢ { WitetEam DSA OotaStuctaer Agorthns Interview Peparation DataSciance Topicwie Proce Che Joa Python serene engneormg cup rd cohen a0 complete detats about it Thoretore Software requirement analysis simply means complete study, analyzing, describing software requirements so that requlrementsthat ae genuine and needed «an befutiled to solve problem, There are several activites ivolveain analyzing Sortware requitements, Some of them ae given below Store Engng clonal ote del o) — (552 Competitive rogramning JavaScript Machine)” Per ecarrienen eens al prensa ym e5¢ 20: Wie Eom DSA DotaStciuse Agorithms Interaw Peparaion Data Scionce Topic-wiePocize Cis Java Python Competii Programming Javscript Machine > * Road Discuse Practice Video Courses ae ¢ —- se as SEs AaB loa Analysts Proton Rcegtion Awerds ‘The main aim of requirement analysis is to Fully understand main objective of ———s ‘beneficial, does it increase quality of the project, does it will have any other effect. All these point are fully recognized in problem recognition so that requirements that are essential canbe fulfill to solve business problems. Dont just ave, invest Evaluation ond Synthesis Evaluation means judgement about something whether tie worth or not and WHAT'S NEW synthosis means to crate orform something, Here are some asks are given tat Isimportantin the evaluation and synthesis of sortware requirement ace ‘+ Torin all unctons of sortware that necessary. ‘Preperation Sal Poced + Togetine al data objets nat are present externally and are easily observable. cone P Workeretoseae e5¢ 10: 4 WiteEom DSA OotaSructuee Agora Interview Paporation DotaSciance Topicwie Posie Che Joa Python Compatine Programming JovScrigt Machine > ~ ow —= aad Giese Procice Video Count _ uo Cr 2 ania, 1. Problem Recognition W ra ‘The main aim of requirement anayssis to fully understand main objective ot at requirement thatncludes why itisneeded, doesit ada value to produc, wilitbe cares Analysts beneficial, doest increase quality ofthe project, does it withave anyother effec. br Awards: Allthese points are fully recognized in problem recognitions that requirements that are essential con be fulfill to solve business problems. Evaluation and Synthesis Evaluation means judgement about something whether itis worth arnt and WHAT'S NEW synthesis means to create or form something, Here are some tasks are given that Isimportantin the evaluation and synthesis of software requirement os Toetine al functions of software that neceseay. ‘reparation Self Paced Todetine al data objects that are present externally and are easily observable. Toevaluate that low of data fe worth o ot. Totully understans overall benavie of system that means overall working of system. ‘gone a ced P Workeretoseae e5¢ 4 WiteGEom DSA DataSets Agora Interview Pporation DotaSciance Topicwie Poca Che Joa Python Compatie Programming JovScrigt Machine > ~ =—— fod Dic Price Vino Counmn a0 = mn LZ ‘+ Toevaluate that flow of data is worth or not. == system interacts with two ar more components or with one another. 5. Modi After complete gathering af information rom above tasks, functional and bbehavoral models are established after checking function and behavior af system using a domain model tat alza known a the conceptual model P Workeretoseae {WitesEam DSA OotaStucturee Algor Interview Pparaton DotaSciance Topicwie Proce Che Joa Python Compete Programming JovScript Machine > ‘asic i od Dhcae Prcice Wino Cowsee 0 ions ‘Tosti and estalsncharactr of sysemintrtae to fully understand how Yow eta system interacts with two or more components or with one another. BI 3. Modeling After complete gathering af information rom above tasks, functional and bbehavioral models ae established after checking function and behavior of system eat cate sto using a domain model tat alza known a the conceptual model ‘option 4. Specification ‘The soars requirement speitcstion (S28) which means to apeciy the requirement whether functional arnan-funetional should he develope Ss. Review “Ty Digtalooeans For Free Alte developing the SRS, lms be revieed to check wheter canbe improved ae >| ‘ornot and must be refined to make it better andincrease the quay, —77 Prepare forfree Interview Series expt r-exomst 2S, ae P Workeretoseae SS ———- «SSE Eom DSA ateStuctuee Algoritns Interview Paparaion staSciance Topic Proton Cou Jove Python + Data Dictionary Itisa repository that consists ofa description fal data objects used or produces by he software. tstores the collation af data present inthe software. tis avery ‘ruca element ofthe analysis model, t acts as a centralized repository and also helpsin modeting data objects defined during sottware requirements, + Entity Relationship Diagram (ERD): It dopicts the relationship between data objects and is used in conducting data ‘modeting activities. The attributes of each object in the Enity-Relationship Bagram can be described using Data object description. It provides the basis for activity related to data design + Data Flow Diagram (DF) It doplets the tunctions that transform data How and also shows how data i {Wanstotmes when moving trom input t@ output, provides the additonal Imormation which is used during the analyse af the information domain ana ‘serves a8 a bask for the modeling of function, I also enadles the engineer develop models of functional nd information domains atthe same time P Workeretoseae 1, — oD JovaSeriph Machine ‘Issued in publi interest and Education byMert o e5¢ 10: te Programming JovaSeriph Machine Eom SA CateStuctuee Algoritns Interview Paporaion Data Science Topic-wiaProctin Cos Jove Python Comp os {Issued in publi interest and Education Dy Meri Data Flow Diegram (OFO): wen SS It deplets the functions that transform dataflow and It also shows how data is transformed when moving trom Input to output. It provides the additonal Information which is used during the analyse of the Information domain and serves a5 a bacs for the madeling of function, I leo enables the engineer ‘develop modeler tunetional and information domains tthe same time State Transition Diagram: It shows various modes of behavior (states) ofthe system and alo shows the transitions fram one state to another state inthe system. It alsa provides the details of how the system behaves dus to the consequences of external events. t represents the behavior ofa system by presenting Is states and the evens that ‘cause the system to change state, I also describes what actions are taken due te accurrence of a particular event Process Specifcat It stores the description of each function present in the dataflow dlagram. tt P Workeretoseae Eom SA CateStuctuee Algoritns Interview Paporaion Data Science Topic-wiaProctin Cos Jove Python Comp te Programming JovaSeriph Machine aad Diets Procice Video Court a0 ‘develop models ot tunetional and information domains atthe same time + State Transition Diagram: It hows various modes of benavier (stats) ofthe system and aso shows the Lwansiions trom one state to another stato Inthe system. It also provides the details of now the system behaves due to the consequences of external events t represents the behavior ofa system by presenting is states and the evens that cause the system to change state. Italso describes what actions are taken due to the eccurrence of a particular event + Process Specification It stores the description of each function present in the dataflow dlagram. tt ‘eseribes. the input to @ runction, the algortym tnat is applied for the \wanstotmatin o inp, and the output hats produce, Itaso shows regulations and barriers imposed an the performance characteristics thal are applicable to the process and layout constraints that could influence the way in which the process wil be implemented P Workeretoseae Eom SA CateStuctuee Algoritns Interview Paporaion Data Science Topic-wiaProctin Cos Jove Python Comp te Programming JovaSeriph Machine aad Giese Procice Video Count a0 + Process Speciticat It stores the description of each function present in the dataflow dagram. 1 describes the input to a function, the algorithm that is applied for the : transformation of inpul and the output thats produced. Italo shows regulations ‘and barriers imposed on the performance characteristics that are applicable to the process and layout constraints that could influence the way in which the process wil be implemented + Control Specification 1 stores agaitonat information about the controt aspects ofthe sortware. ti used to indicate how the soriware behaves when an event occurs and which processes are invoked due to the occurrence af the event, It also provides the etal ofthe processes which are executed to manage events. Data Object Description: It stores and provides complete knowledge about a data object present and usea Inthe sottware. i also gives us the detals et attributes of the data object present P Workeretoseae SRE F< no + [BEG [SiN] Baie x] OnE EuaNE| ue] Se xs xr 4 WitetEam DSA DataSets Agortho Interview Pparation DataSciance Topicwie Proce Che Joa Python Compe Programming JavaScript Machine ® aad Giecas Procice Video Couns a0 Scapa It stores the description of each function present in the data flow diagram. It Saad prenretntonn + Process Speciticatio + Control Specification: It stores adational information about the control sepects ot the sottware. It ke led fo Indleate how the stfware behaves when an event eccure and whieh processes are invoked due to the occurrence of the event, I also provides the details ofthe processes which are executed tomanage events Data Object Description: It stores and provides complete knowledge about a data object present and used Inthe software. Wt also gives us the detallsof attributes of he data object present Inthe Entity Relationship Diagram. Hence, it Incorporates all the data objects and ‘oir attributes. P Workeretoseae 4 WiteEom DSA DataSets Ager Interview Paporation DotaSciance Topicwie Posie Che Joa Python Compete Programming JovScrigt Machine > ~ aad Giese Procice Video Count a0 Google It stores adational information about the contro aspects ofthe software. It is E Used to Indicate how the software behaves when an event accurs and which i process willbe implemented. processes are invoked due to the occurence of the event, I also proves the ‘etal or the processes which are executed to manage events Data Object Description: It stores and provides complete knowledge about a data object present and used Inthe software. Ialso gives us the details of attributes of the data object present Inthe Entity Relationship Diagram. Hence, it Incorporates all he data objects and thelr attributes. Prepare forfree Interview Series terséir-exmsr | 2S, Maat 9. ble Oe tay Falotonly tga. lve, Swcopbostae oD ta cal ofp uk tut atid War a. Hoag ool ak diag ys ie ligase fe gules eat ora yi ay tsi Ahly duties ie quite i. sha_corspston ach ap ve sea ilu dstob| De ob Hi) tna he oj shay Ath “What ty fe aeatiorie — chthet sl ct aya oa: aaah aah iy le fo eects a fe seta hanylet fd Ds i, i al fini “a rel cs a iar. Adobe ra repracrbiono- qbveact_any. corey. “inj iveammiat by sephace, Acta." oye. be aueaftinal uty. bog dn econ Tas estore 8 Ailyeiont call) on Leet Colanim ) 2 role Cog. sabyptstan,),.&. files — httruser cline the opopete op. e~ date. igactonl fade en tee, diver dives chalets tg tn he tlt (nian ian “4 tte ck, 2) dtc a Carne Breage te barman ee Silt Pate_obyjrde ary comnscted AO Ore dnotieen site pout says. Cauda fct-dalr_olyrle , heoard baokstste nl aur diye“ a sskop eyed ond pade Sak eye tbe Julseutitlabnaliy Jochieen deck ad beeslona fx clave” factions onda owe, — A bechutsee lA book, —_|\bstlalectscla books, "— a beokskne _aelu hoot, > — A bonetine hoe goles: pute pad altri dons tno ard oly weasne’) C4 ua weutrence @ ob A tau aalate to Mer Bo i Bewcrarves of thf, A Hy fi Coal) rae aj cst hina” scene 90 Se vedlly wa stakeniip 4 04, Kank ili sk Ty oo sa testy ipl ay 1 jens di tna. usta jlo sap el itt ye fuinahips at dante vd lal he cerling Tass mmakove —epdiuéto, hr ecg lee cinblte aden ashen dal bye ave Fy sia cb ely speed yrs hak idea. Malian a stcbuaad (edi US rsd, Wer functioned vce. cenit out? due als fas Abstr tec booke, — A _beokatre scbu" beotee,—> — A bonatine hte Ago: Aanaioe codon, dlyplye , Sechelt ard satus dpi te siltass onntckions Bebo beckard, .bodkale. i spechieaton My the neg Lated..B Ve. rane re LUD = Aemara.g tandy ep On focusmae 4 acta” Lote hy scuvenee goby AP a ule bo tr rn. acu fe, thy bong Covi) wctrce pcg cm taco eho.” Sezione 440" Ca vielaley » a.sdeontap 0.4 Hawk i aplasia eis oe sabre Span fu moda th tf. an ccoumsande di. ai a pais uly ehiacap “ase: ol, Vijute_ase spiced by a anal fini al dst ihe. dhl he crmeling shel, inte king, He cena ie conta Bi lakh we th ieasip- Cmca dade ac. Maange a ebuiadsatag Cooty el yl dice dleate. sa (adil Ud rely © 200 sncte (Bee FO H| Riana WAM oon on etme] Cuma) e YS ea a0: © > SB yoututecam jan -orUASAY cctmetonrumecasn SotwareEngesing-Engneetng smsemeX Qo) & © sonia Bowie Same the folowing rearing the deveepment ofa stbrare stem BSI ose crrocton 2 Estimate lines of code oP: 33,480 LOC for P 620 LOC pe person meth Average prot Jopers:6 ib of software wvorage salary of a stare developer: 850.000 per month ME, Dan Carethe estimated development time (in month), and estimated development cost in € Lac) epectivey, then (ED, C) development inperon months ) 8% @ 6 8 @039 ring Numerical - LOC FP COCOMO | Software Engineering Numerical UGC NET PYOs ERNE 8 0-tensyanes Sn nominee peer ED 2 tector ve Pom come eee € > © jouibecon ouube cstmetonumetcals mn SotwareEngesing-Engnestng stsemeX Qh «Estimated lines of code of P: 33480 LOC Serenity een eee ae) aca ‘Step-3: Estimated development cost (in Lac) = $0000*6 ne Software Engineering Numerical -LOC FP COCOMO | Software Engineering Numerical UGC NET PYQs jan oman ED 2 tector ve RE ERNE 8 0-tensyanes Bp sme Duis A Software project was estimated at 864 Funetion Point: person team will be to project consisting of a requirement gathering person, one designer, two programmers and two testers. The salary of the designer is €70,000 per month, requirement gatherer is £50,000 per month, programmer is €60,000 per month and a tester is £60,000 per month. Average productivity for the team is(12 FP per person month. Which of the following represents the projected cost of the project? (1) %33,20,000 (2) %43,20,000 (3) €33,10,000 (4) ©22,10,000 Tote FP = 264 fra EP = 1a pa pesen Pr menkh Fetal 6 pemon ong nal duoekton to Compuke 864 FP So tim coe ele pejeck Cork of te Oi peomon + i digne + 2 agrenntrs es Requironek outer 42 tke) & G12 . 60,000) t (axerve0d) x @iz =x soyoory + (incision) A Company has a choice of two languages L; and L; to develop a software for their client Number of LOC required to develop an application in L, is thrice the LOC in language L, Also, software has to be maintained for next 10 years. Various parameters for two languages are given below to decide which language should be preferred for development. PARAMETER A A ‘Man-year needed for development | LOC/1000 | LOC/1000 Development cost Rs.70,000 | Rs.90,000 Cost of Maintenance per year Rs.1,00,000 | Rs.40,000 Total cost of project include cost of development and maintenance. What is th& LOC for Ly for which cost of developing the software with both languages must be same? (2) 6000 5000 Like, Share Subseribe and click the bell icon to get all latest updates Let LOC of L1=x, so LOC of L2=3x (x/1000)*70000 + 10*100000 = (3x/1000)*90000 + 10*40000 70X + 1000000 = 270 X + 40000 200X = 600000 py aci0)0]0) ca \ Like, Share Subscribe and click the bell icon to get all latest updates Wed (Conlsuachive Gort_mookth’) ome Used fir Coouboting cont med daw eu (Smal , Same clvelopenent Aone pratour Spent bef ith prec pruvour dlaveloperne Fancttonadaky not Hone Ongos t semi dabachecl (Some Coveted! (wesw tyre ond L al ee Mite Ponmuler of Cocomo (con L os a = Ha (kts) ® Ow te vrssbphicabve Focton| te Effet) —— ie vy te _exporenhal oekon ie pacotve chen ffm Speen D ty Keke, moully) ya ae eagorartot eke reelopment = ey Fe A wdL ee Gen wn exam. PPP SEAN UNE et ROR Acs ee Uae Reece eC LULU) function points and is planning to use JAVA as the programming language whose OT LORt Cs omc Tae cCo EMR ROCs cr teams as multiplicative factor,b = 1.0 as exponention factor for the basic COCOMO effort Pe CeCe eMOECR Ma Une eran EORTC e eee oa PeePKOCeO ORT scone oNa tia ore eich sri CTs el ck eon ced (1) 11.2 months (2) 12.2 months (eSB EMR (CBU mentont Nee eae Q) The number of function points of a proposed system is calculated as 500. Suppose that the system is planned to be developed in Java and the LOC/EP ratio of Java is 0. Estimate Hea Reo ed sec cca nz Lire CoemCR arse) given below : E = a(KLOC)? Assume that the values of a and b are 2.5 and 1.0 respectively. EYP LS oc mney B) 75 person months Olesen iy Donny 7 > mo Beas SERRE) 0 nares © @ Fe ClkerOay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO se Tier noe tide som mie Sete Tibet PD woeheretosenen SOFTWARE DESIGN AND SOFTWARE ENGINEERING Sonware design sts atthe echnical Kamel ofsotware engineering ands appa Eachfthe clement ofthe anass model (chapter 12) provies Information tat ss necessary to crenie te four design models equea fer a complete specicatlon at ‘design. Te foe oinfrmation ding software dest fuse in Figure 13.1 food the dea ask Using one of number of design methods (scsed in ner ‘haptr) the design ask prodces a data design an architectiral din a inte face desgn. and 3 component design "et design transforms the information demain mel created ding nabs into the data smactres tha lhe ries t implement te aware The data ‘ec and telatonships defines inthe entity eatonship chagram and the detailed {ata content epictinthe dts dona pend the Dao the cata ess ct ity, Pa of da design may occur in conjnction wth the design of sftware arch tecture Mote deta data design occurs seach software components designed. ‘hearths design defines the reatonsp between majors eeents Pimkcwans WG Bee NSS SENEaR) 0 novemos x [es uRMn) |G) ae |B Sa arutctual design patems canbe applied (SHAMS). The afeitectural desig ep Pimkcwans WG ee © wes © @ Fe ClkerOay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO se PD woeheretosenen hnvebeondemestoethe stem, andthe conerintsthat ecthe wy which areatectural design patems canbe app (SHAY). The aciieturl design ep riaion—the iamework of computer based sjstem—can be dvved om the within the analysis mode tse toa procera description of sciware components information tained Dring dest we make decisions that wll imately afet the scces of sf nied Bt why dew 0 pra? The importance af scware design canbe tated with a single word—quaty Design the pace where quay fostered n soware engineering, Design po ‘vides us with representations oftware that canbe asessed for qa. Desig i neon way tat we can accurate translate a customer reiements to 3 she stare predict or sytem, Sorte design serves asthe Fundtion foal Fitwcton x] 2 teins x | A Banpgae XO oersmos x |B © @ Fe ClkerOay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO se ‘werk bling anunsabesystem-cne that il fal hen smal changes are made the sfiware proces, when tes short and many dallarshave already been spent 13.2 THE DESIGN PROCESS ‘Sothware desig ta erative procees through which regiments ave transite ‘sencurofeotare. That, the design eepetentedat highlewel of sheracton- at, unconal and behavioral equements. As design teraton occur, subsequent 1821 Design and Software Guaity ‘Tvoughout the design proces, the quality ofthe evoling design is assessed wih cGlaupbln PCCD] suggests tee characteris tat eve a ude the eral PD woeheretosenen 7S © @ Fe | ChlerCayDonninte Sota PD Woeheretosenen WARE 0 cassie Quote: “Bonen! fen not ne Stetina Shenae a tear ver seers Prersn APRACTONERS_APPRORCHS2O2 get ata, incon and behavioral requirements, As designations occ. sabsequet| rementnt lends design representation at mich wer level sbetacton These ‘an sl traced to requirement the connection fe more sb 132.1 Design and Softwene Quality “Tvoughout the design proces, the quay ofthe evolving design assessed wih 2 vies of formal technical rele or design walkthrough decseesm chapter DMcClughin CGD | suggests ce carats ht Sene a gud othe vation ofa good design +The cesign must implement al of the expt equirements contsned nthe nays model and t mist accommodate al othe pict requirement code an fr those who test and ubsequery suppor the ‘he da, incon and behavior! domains fram an impementation 1A design should bit an archectralsrctre that (1) hasbeen crests | 6 Somes | FY Stang ° © @ Fe CHker/Oay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe code and fr those who test and ubsequerty suppor the soar ‘he da, fimctonal and behavioral domain fem an impementation peepectve cof ese goals achieved? tn some cal or the me being, we preset the floring gules. 1A desig should bit an archectralsrctre that () hasbeen estes tng fecognizable design patlems, 2 is composed of components tat tet good design characteristics (hese ate dscsee ater in his chapte, Implementation a tesing . Picton | Somes | A tanpagae XO aersmos x |e Benet oe x © @ Fe CHker/Oay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe and (8) can be implemented in an evolutionary fashion. thereby facilitating implementers a testing fA design sould ne moda that the sonar shouldbe lag pat teraciys A design should cota itn! representations of data, achitecture, ner st aces and components modes) Oeste france A des should lead to data tractors that ae appropriate fr the cect Severn be plemented and ate drawn om ecnizabe data ples, = ad to components that exhib independent orton = Adee sho io component xt sens a ‘gat A design shou lead to nteracesthat reduce the complexity of eannetons fepenn s teen modules ad wth the extra environment. Goran S="e ata ted oe A design should be devine uring 3 repeatable method thal is driven by nr het’ ratio etancd uring sotware eqements anata PD Woeheretosenen ES © @ Fe CHker/Oay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe PD Woeheretosenen oxen aero mans ‘ale Soren or (een et ta roe par A deg shold contain distin representations data, archtectre, ter faces, and components toes) ‘design shoul lead to dts strict that are appropiate forthe bjt to besmplemented and re dawn om recogible ts pater, ‘design shou lead to components that exhibit independent fnctionl between modules nd wth the extra ensironment. ‘A destn stould be crv using 2 repeatbe meth tha ven by er ration btancd dering sotware requirments nates ‘hese cea ae not achieved hy hance. The saware design poceesencarage=| 1 design thrgh the aplication of fondamental design princes, jstematic methodology, and though een 182.2 The Evolution o Software Design The even of afar design i continng process that ha panied hep ES © @ Fe CHker/Oay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe PD woeteretosencn % POINT Seay Sbbeba hed Sedat edi ‘herein Davis [DAVIE] sigest set! of principles for software design which have Beer ‘adapted and extended in the following Lit. Ces Sol consie aenatve pproactes jung cach es on he reiemen fhe pete the resources sale todo the, andthe The design shoud be traceable tothe anaes model. case angle Clement of he desig adel ten acest multe regents se the design mode . The design shuld ot event the whee. Spe st contre ng aoc den pte, many of which Relic been encountered befor ‘Time is short and resources are limited Desigh time should be invested in “The design should minimize the intelectual distance” [DAV95] tetwecn the sftware and he problem at exes the real wot Thal the race ofthe soar eign shu (wheneve pss) Inet scrote pti dona. “he design sould exit uniformity and intertin, A designs and forma shuld be dtd a eign tam eee design work gs. A components» - ES © @ Fe CHker/Oay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe PD woeteretosencn % POINT Seay Sbbeba hed Sedat edi ‘herein Davis [DAVIE] sigest set! of principles for software design which have Beer ‘adapted and extended in the following Lit. Ces Sol consie aenatve pproactes jung cach es on he reiemen fhe pete the resources sale todo the, andthe The design shoud be traceable tothe anaes model. case angle Clement of he desig adel ten acest multe regents se the design mode . The design shuld ot event the whee. Spe st contre ng aoc den pte, many of which Relic been encountered befor ‘Time is short and resources are limited Desigh time should be invested in “The design should minimize the intelectual distance” [DAV95] tetwecn the sftware and he problem at exes the real wot Thal the race ofthe soar eign shu (wheneve pss) Inet scrote pti dona. “he design sould exit uniformity and intertin, A designs and forma shuld be dtd a eign tam eee design work gs. A components» - wa kee |e © @ Fe | ChlerCayDonninte Sota PD woeheretosenen BEY 0 pews seers Prersn APRACTONERS_APPRORCHS2O2 get pase} pean “The design shouldbe structured to accommodate change. Te ign concep dics nthe nes section enable desig o ahve this principe +The design should be structured to degrade gently, even when aber ‘inte, creat, or opeling condtine ere cacentered, Wel Design ie nt coding, coding ie not design. Even when dea! proce hc ise agit a sere at Te wy a dat rocedira design to be eed "he design should be assessed for quay ait is Being created, not “The design shouldbe reviewed 1 minimize conceptual (smanti) ‘errors. Theres sometnes tendency focus on mine whe he desig ‘reviewed missing te fre forthe trees. A desig ea hol nae tat. mG Picton x | C Satine x Fi Samegue: © Or jase} peondnset PD woeheretosenen Cyeenel/DouncadSohuare fngnetng_-Peuran PRACTINONERS_APPROACHS2I0 pa ‘The design shouldbe structured to accommodate change. The deign ‘The design shouldbe structured to degrade gently even when aber ‘ant data, events, or operating conditions are encountered. el ‘esgnessotvare should never “bom shi be designs 1 Design is not coding, coding is not desig. Even when dialed proce he design mis higher than source coe The cn design decsons made rocedira design to be eed, “The design shouldbe asessed for qualy as is being created, not after the fac. A varetyof dese concepts Section 3.4 design mens “The design shouldbe reviewed t minimize conceptual (smanti) reviewed missing the forest fo the wes. design team should ensue that ogeam components, he level o abstraction at tha exis bh exema rita qu tre DEVE. xem qu fe are those properties ofthe ota tht can be realy bene by are e reat comectess, aby Intra quay oc ane of mpertance t tare Deere ABSTRACTION Many levels of abstraction ighest level of abstraction : Solution is stated in broad terms using the language of the problem environment Lower levels of abstraction : More detailed description of the solution is provided Procedural abstraction -- Refers to a sequence of instructions that a specific and limited function An example of a procedural abstraction would be the word open for a door. Open implies a long sequence of procedural steps (e.9., walk to the door, reach out and grasp knob, turn knob and pull door, © FSA youttecamjaservgtoonst 3 Bowie ‘Abstain Rta Moan 6. software Aentctuee CoM Software architecture is the structure or organization of program components (modules), the manner in which these components erat adhe Sucre of data tht are ued by We components ‘Shaw and Garlan (Sha95a] describe a set of properties that should be speciied as part of an architectural design: + Structural properties: e.9,, modules, objects, fiters ¥ Extra-functional properties: how the design architecture achieves requirements fer performance, capacity, reliability, " ‘security, adaptability, and other system characteristics. Families of related systems. Design Concepts in Design Enginosring par-1 EEA 2 tec tos0 ve BA sme Domlnd MODULARITY Divides software into separately named and addressable components, sometimes called modules. Modules are integrated to satisfy problem requirements. Consider two problems pi and p2. If the complexity of p1 is cp1 and of p2 Js cp2 then effort to solve p1=cp1 and effort to solve p2=cp2. If cp1>cp2 then epi>ep2 The complexity of two problems when they are combined Is often greater than the sum of the perceived complexity when each Is taken separately Based on Divide and Conquer strategy : it is easier to solve a complex problem when broken into sub-modules INFORMATION HIDING Information contained within a module is inaccessible to other modules who do not need such information Achieved by defining a set of Independent modules that communicate with one another only that information necessary to achieve software function. Provides the greatest benefits when modifications are required during testing and later Errors introduced during modification are less likely to propagate to other location within the software. © FS A youttecamjatn asian aI Bowie ‘Anstictin tienen Mo Design Concepts aul REFINEMENT & REFACTORING Lotus Makeup tw Refinement . Process of elaboration from high level abstraction to the lowest level abstraction High level abstraction begins with a statement of functions. Refinement causes the designer to elaborate providing more = ‘and more details at successive level of abstractions, Abstraction and refinement are complementary concepts. Le ss Design Concepts in Design Engineering patt 2 la EE Ce =) GaP Aimy vonied EEN © 2=tectosenen ve = Bue X/Ceen N/A BawanR) 0 pare © @ Fe | CherOotDonniadeS, Cone pete alae ‘Seton ‘en 0 oe os PD woeheretosenen seerns_- Prenat APRACTONERS_ APPROACH pct ortehnial process hat the stem must accommodate, Finally, noma made ‘numberof dieren archiet senpc oped io present these model (S149 gu (ADL) have been deve Altough many dierent ADL: Rave been repose. the majority provide mechanisms fr desoing stem components xt the manner in which hy are connected Wo one another 1345 Control Hierarchy {Com hen len ale progr srr, epresnts the organiation of mcomponents mies and imps a erarhy of con. does ot epresent Droceiral arpects of entre ich as eequence of processes, occurence oor dco pla pert er necessanly applicable to al 3h flee tations ae sed orepresent conto hitch for those architect lve tat are amenable otis representation, The mest common she eel da 7 igre 12) thot represents raenca cont fr ell an etm architec tower tofaclate ltr dsc 133, dep and wih provide an indication of the numberof evel of cond and 14C85| may also be used with equal efecivene RS BEER) 0 namsme x © @ Fe ClkerOayDonnnteSotaaeeEngneeens_Peaman APRACTITONERS_APPROACHS2O2 pe ble that contro another morte si 0 be role controled by anthers sd tobe senate othe conte [YOU For ‘example relersngo Figure 13.3 module is superna to modes. b anc ‘xl subordinate to module c and is uhimatelysuhorinaeto module ‘whsth-onented elatonenps eg, beeen modies dnc) hough posable to ‘apres in practice, ned nt be dened wa exp teminclgy "he contol rary sls epresenstwo sub ciferen characte ofthe ‘state architecture vl and connect Moby estes the set ofp ‘omnponets that may be nvoked or wed as databy a gven component even when this accompiehed ndretly For example, a modem an cbect mentor may tave accesso a wie aay of daa abjectsthat Eas need, Dul makes use ‘fenlyemal number these data objets. lth objet sre vibe the mn Le Connezniy indicates these ofcomponents hat ae ect invoked o used as atabya gen component For example, a moduethal del causes another mod ble to begin exec comectd 0 19446 Structural Partitioning ‘Wloned both horizontally and vertcally.Refetng to Flgue 13a, hrzntl pat sng ens earache hemor each for exh major rogram odes vepresnted ina darker shade reused to cootdnate com RS BEER) 0 namsme x © @ Fe ClkerOayDonnnteSotaaeeEngneeens_Peaman APRACTITONERS_APPROACHS2O2 pe 1346 Structural Partioning Whe architectural aye of aystem te herarchica, the program structure can be ar tioned both hrizcrtaly and versal Referring o Fire 134, oriental port toning deine separate branches ofthe molar Herre for each major program function, camo modes represntsina darkersnae ate esta coorinse com munication between and exectcr othe functions. Te simplest approach oho Zonta parttoningcetes tree partons np ia rasta on cal roves and opt Partoning the archtestore herent provides namber + propagation fewer side elects ‘complex and exersons tothe system [3 common acctrence end ta be ee 0 accomplish witht sdeeflecs. On the negative sie, horizontal poritoning often ‘hures mote data abe passed arossmoddentertaces and can comphese the ver al cma f program fw processing rexites rap movement fom one ne ‘onto ancther PD woeheretosenen Beas RE ERR Sn) 0 naam © @ Fe ClkerOayDonnnteSotaaeeEngneeens_Peaman APRACTITONERS_APPROACHS2O2 pe 1346 Structural Partitioning Whe architect! se of assim ishierarhica. the program structure can tioned both erizcraly and versaly Refering o Fire 134, orion prt toning deine separate branches ofthe modular rare for each msjor ro function, camo moses repesntsina darker se are sda coon munication between and exectcr othe functions. Te simplest approach oho Zonta parttoningcetes tree partons np ia rasta on cal roves and opt Partoning the archtestore herent provides namber + propagation fewer side elects ‘complex and exersons tothe system [3 common acctrence end ta be ee 0 accomplish witht sdeeflecs. On the negative sie, horizontal poritoning often ‘hures mote data abe passed arossmoddentertaces and can comphese the ver ‘onto ancther ro of program flow processing requies rap movement fom ne une Ames x) 2 enn x | sane © @ Fe | CHkeeCay Donna Sota PD woeheretosenen 5 Prcma AERACTITONERS_APPROKCHS2O2 pct % POINT “be wa ae ea ed twtr ‘pe sit vores pottonra eral patos gue 13.4), oten called facing suggests that contol (ec soning and work soul be debate top-down nthe program strict Top level modules should perfor contol functions and do ite actu prcesing work, ole that reside own te erie shoud the worker, performing al nt ‘The nave of change In program stucturesjstls the need fr vertical pat (hgh inthe structure) wil have a higher probably of propagating side elects to ‘changes to computer programs revolve around changes to int, computation ot remintainabie-atey ualiy factor 1347 Data Structie na rte ea representation ofthe ogc relationship among inci ele mens of data Because th tute ofnfrmation wiliatiablyafet the bal po ‘dural design, data stactre t 36 myportant ae program srictine to the RS BEER) 0 nomenon x © @ Fe CHker/Cay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe 1347 Datastuchie Di tie 3 representation ofthe logical relstonehip among inci ele cedural design, data structure 1 35 important as program structure 10 the Data strcture dictates the ngoizaion, metho of acess, degree of acacia ty, and processing altemstives or information Ene ete, HOSS), RUB), IGANSs} have teen dedicated ta these topics, anda complete scission beyond the scope of hie book However, ie portant to understand the cae metho "Te crganization and complexity of datastrctre ae limited ony by henge ruiy ofthe designer Thre ate, however alimted number of csc data sucures ‘Teele ena form the bing locke tormoresophiniates trices. ‘omc ae beames te ‘scar om is the sinplest ofall data srctues. As Rs name ips, a salar PE) oo = es Ames x/ 2 een x | sane © @ Fe | ChlerCayDonninte Sota 2D woeheretosencn BEY 0 pews seers = Prersn APRACTIONERS_APPRORCHS202 get POINT “tte fewer ‘ua, sha ia eg on Modules that reside low in the structure shouldbe the workers, performing ll input The nature of change n program SuUciures sti he need fo erica pat anges to computer programs eveve around changes opt computation oF ransfrmation and ouput. The overall contra sucture of te program (, task tchavors fr ess ikely tochange For his eason vertically portioned srctres a es ely tobe suscep to sds eflects when changes ae made and wl hee or be mere mantainale—n key quay factor 1347 Data Structure Di ie 3 representation ofthe ogc relstonehip among inci ele cedural design, data stuctue I 25 important as program structure to the RS BEER) 0 nomenon x © @ Fe CHker/Cay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe bata stactre ictts the organization, methods faces, degree of asc sy and processing ltematves for inonmation, Eke txts [AOE KRU), Taney navereen dedicated totes opie, ada complete aecusson beyond the scope ofthis book However tis imporant to understand the lsc method ry ofthe designer There are, however shed rumber acs data ices that fom the bldg Hooks for more sophie stroctr item represents single clement of information that maybe addressed by an ert Tar tats, aeees may be achieved by spectying 3 singe adress n memon? he Deeds rca format of 9 scalar tem may vary within bounds that ae ectated By 9 pro syanning language For example, «cla tem may be a logical ent ene it on a integer oroating pon amber tat is 8064 slong. or acharacter sing that is hundreds or hoaronds of byes ong. When scala teme ae ngonnes ne a it conic group, a savin tr stormed. vectors are the most comme of ll data srctsres and open the cont ‘onl ngexng of nvormation hen the sequertia vector sesende to wo, the, nd ulmately an arbaray umber of diensions an. dienstond: paces creed. The most common -dnen ‘Sonal pace sth wo dmensional matric In may programming langage, nn fl dats sroctres As te name implies, 3 ast Toms vecors and spaces maybe organized in variety forts. A nk Pioenen © eee RS BEER) 0 nomenon x © @ Fe CHker/Cay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe Sang longue For examples lor fem may bes geal en ere Bee hen cla ems reorganized as also congue grep, acyl ctr varie inden ofnmation butero dimensions an diesen spa screed. hemos common nen onal spaces the wor mensional mati n many programming langage an tems, vectors, and spaces may be organized in a variety of formats. A linked ist manner ale rie tht enables them tobe procesed 38.018. Each Made indicate the adsress in storage of the next node i the list. Nodes may be adkled at any pon in the Tis by redefining pointes to accamodate the net is ny TSodeuasge tres ft deseo. Forex, emrchldotr ruc mplemented SEREag ctngrtinkdiste tae continsaarems vers ané possi ndmnensor] SSeiwumers spaces Atseahcal srt commeniyencouterstn apa at eae mined "information categorization ad associa mrp x Ysented at diferent levels of abstraction. For example, a stack sa conceptual (miner rand ofa dats sirictre that an he iplemented a 9 vector or lnk i Seeioyen Depending onthe lve! of design deat nema! workings ofa tack mayor say net be species P tear » EE EEE ee eae 700: Drouin coral ncependnecneon and eauggwiEMecoe XQ.) & @ sone Queue x Effective Modular Design Sa er mplernentation by encouraging persia development of t Sate oe lifferent parts of 9 system. esnconets a Fictional Independence The, concept of functional Independence Isa direct cuterowth of prodilanty andthe concepts of sbstracion ond informotion Nang aflame sah cee chee tr ee sive at 2 Een iisect hee Jayot Vidyapeeth Effective Modular Design Orr cores 2/9) Bam Lome ED 2 etc tose ve © FS A youutecamjascrv=Couveontee waes = Bioiie Ds Effective Modular Design (Cont.. Cohesion is_a measure of the relative functional ‘Sangin of module, “ra Viggen oda ‘cohesive module performs single task within a mam fotare procedure — We atways strive for hgh cohesion although the Imirange ofthe cohesion is eften acceptable Cohesion may be represented asa spectrun ‘module that perform a set of tasks that relate to {Shen other ocely I caleo coincidentally ‘cohesive. ‘Amodul that pertorms tasks that are related ‘ogtcally i togially cohesive, Jayot Vidyapeeth Effective Modular Design pom ED 2 etc tose ve © FS A youutecamjascrv=Couveontee = Bioiie a Effective Modular Design (Cont.. + Wen a module contains tasks that ae related by the fact {les temporal cohesion ° 7 Ov: + nen processing elements of module are relates anc must be executed in spect order, procedural cohesion. + When al processing elements concentrate on one area of 2 data structure, communteational cohesion 's preset. igh cohesion scharacterzed by a madule that performs one distinct procedural tack. Jayot Vidyapeeth Effective Modular Design Orr cores 2/9) Bam ome ED 2 etc tose ve wae © FS A youutecamjascrv=Couveontee = Bioiie Effective Modular Design (Cont...) (2) Coupting ‘Coupling Is 2 measure of interconnection (the relative } interdependence) among madvles ‘Coupting depends on the interface complexty between modules, the pont at which entry or reference Is made {ora module, and what data pase across te Interface In sonware design we sve for lowest possiie coupling. Jayot Vidyapeeth Effective Modular Design Orr cores 2/9) Asm Lome FEN 2 2= tec tosenen ve wae © FS A youutecamjascrv=Couveontee = Bioiie Effective Modular Design (Cont...) + Coupling Is characterized by passage of control between modules is calle control coupling. + In gure a ‘control ag” (a variable that controls decisions in a subordinate or superordinate module) Is passes + When males are tied to an environment external to software igh eves of coupling occur for eg. /0 couples a module to spectic devices, : formats, and communteation protocdl, + External coupling is essential but shouldbe mites 9 & ‘Smal number of modules wth a stocture a dao Jayot Vidyapeeth Effective Modular Design 35 g Orr cores 2/9) Asm Lome ED 2 etc tose ve eaee 700: Boutin Sr steon Oats Des rst eohneanig xl as B som = sername 8 eta design in Software Engineering ic eaee 700: Boutin Sr steon Oats Des rst eohneanig xl as B som = sername 8 eta design in Software Engineering ic Fite x | E otnate x | @ patmimge x | A Eawewes x @ DNase 69 SB yoututecamaschv=sntToa Bowie Sort won Osta Desgrsotnaeenhneering this cater, the buns ining techrges, a9 called inarege DD) that nave thiogh ening dass eta design in Software Engineering EEA 2 b2=tecosere ve x Haney [IL Aegnren | eae NF nn crane eae: wee] xmas 8 heme 8 ww oaasconns |S Hoae en | aeoemal | Fitton | Somednne x | @ pun inge | Sane gues x eae 69 SB yoututecamaschv=sntToa Sr steon Oats Des rst eohneanig Bowie = — eta design in Software Engineering EA 2 tcc vO © > SA youtcamjatn sarod = Bioiiie Sort won Osta Desgrsotnaeenhneering x as Orme — ‘modules that must make direct use ofthe thin the structure Qo“... e> eta design in Software Engineering © > SA youtcamjatn sarod = Bioiiie Sort won Osta Desgrsotnaeenhneering representation of a data structure should ‘modules that must make direct use of the inthe structure library of useful data structures and the o 20 them should be developedy eta design in Software Engineering xl as B som yer @S seuss now Tatar Mappings arid cut drag secu X Steps Involved > Step 1. Review the fundamental system model > Step 2.Review and refine data flow diagrams forthe software. >» Step 3. Determine whether DED has transform or transaction flow chara >» Step 4. Isolate the transform center by specifying incoming and outgoing flow » Step 5. Perform “frst » Step 6. Perform “second-level factoring” Step 7. Refine the frst iteration program structure using: Architectural Mapping in Software Engineering ~ Mrs S. Rema Rose, AP/CSE, RMDEC or. eS FEI 2 ctectoxet 2) 4 Ficton | E Someone | A tanpagae XO aersimos x |e Beamer x © @ Fe CHkerOay Donnas Engneens_Peaman APRACTITONERS_APPROACHSIO2 pe ‘Step 1. Review the fundamental system model ‘Step 2. Review and refine dataflow dlagrams forthe software ‘Step 3. Determine whether the DED has transform or tranancton flow char. ‘ctersis, sep, 2, and 9 ate Mental to comesponding steps tn transform map ping. The DFO shown la Figure 1.13 has aclasic wansacon fow characteris However, fow along wo ofthe action paths emanating mn the ino command processing bute appears io have wansform flow characters. Therefve. ow ‘Step 4, Ldentity the transaction center and the flow characteristics along (each of the action pata, The location ote tanscton center can be nied ‘tet cerned tom the DFD. The wancacton center les tthe cig ofa aunber ‘of actions pats hat flow racial om For he ow shown in Figue 1413, he The incoming path (the fow pahslng which a transaction isrceved) and ‘action pat ate also show nthe gure, Eachacton path must be evaluated fr ts Inada ow characteristic For example, he passwous path shown enclose by a shaded area in Figue 1413) as transform characterises. Incoming transom, ‘Step 5. Map the DFD in a program stricture amenable to transaction pro- ‘essing. Transaction ons mapped no an afeiectre that contain an incom inghvanch anda dispatch branch. The tte of the nom branch developed inch the sameway astraneformmapping Stating athetransacton center, bob Dae a ry

You might also like