0 ratings0% found this document useful (0 votes) 42 views138 pagesS.E Ese Notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
© 9 Cf sesiogeckiomtitiamensnwerngmauremenscictatoy
‘
~ Chieaton of tears
year Piet
ox
2 Worheretoseae
‘gorthre ntervaw Pepoation Dafa Science Topic-wie Pcie Cas Joa Pyhon
ead Diets Procice Video Count 120
+ Detaled investigation of user needs
straints for system development
+ Derinotne
Requirements elicitation Methods
‘There area number of requirements eicstation methods, Few of thom ar sted
below-
1 Interviews
2. Brainstorming Sessions
4 Faciltated Application Specification Technique
4. Quality Function Deployment (QFO)
5. Use Case Approach
asm)
The success ofan elicitation technique used depends onthe maturity ofthe analyst,
developers, users, ana the customer involves
ing JavaScript Machine”
=>
DeuSESE AT ET ~
aad Giecas Procice Video Court a0
2. Brainstorming Sessions
+ Itisa group technique ‘over Stop Regular Heath Check Up
+ Itsintendedto generate lots of new ideas hence providing platform toshare
views 2 * veneers CI
AAT ‘+ sAhighy trained faclitatoris required to handle group bias and group confi.
Every ideas documented so that everyone can see
Finally, a documents prepared which consists of the st ofrequlrements and their
priority it possible
Deu
4. Facilitated Application Specification Technique: nea recunavoer
It's objective Isto bridge the expectation gap diference between what the
‘ovetopers think they are supposed to bull ana what customersthink they are going
toget.
‘Ateam oriented approachis develope for requirements gathering,
Eacnattendee asked to meke alist of objects that are
1. Partof he environment that surcoundsthe systom
2. Produced uy ne system
P Workeretoseaee7¢
teGEam DSA OataStuctwer Sgorthos Interv Peportion DalaSéiance Topicwie Posie Che fora Python Compete Programming JovScript Machine > ~
aad Giese Procice Video Cours a0
3. Facltated Application Specification Technique
It's objectives te bridge the expectation gap-aifarence between what the
(ogee.
_Ateam oriented approach's developed for requirements gathering, 6
achattendee ached to make alist of objects thatare
Soin 1. Partof the enviranment that surrounds the system
ones 2. Produced ty the system
3. Uses bythe system
ach participant prepares his/her ist, citterent sts are then combined, redundant
{entries are eliminated, team i vided into smaller sub-teams to develop min
=pectieations ana nally drat of specification is writencowun using all the inputs
from the mestng
4. Quality Function Deployment:
In this technique customer satistaction|s of prime concern, ence it emphasizes on
the requirements whichatevaluabe athe customer
P Workeretoseaee7¢
teGEam DSA OataStuctwer Sgorthos Interv Peportion DalaSéiance Topicwie Posie Che fora Python Compete Programming JovScript Machine > ~
aad Giese Procice Video Cours a0
ei
.
4. Quality Function Deployment:
In thie technique customer satistaction\s of prime cancer, a
arc the requirements which are valualeta the customer.
Cia) Stypesofroqurementsare identitied~
emphasizes on
+ Normal requirements ~
nth tne objective ana goats of the proposed sortware are ascussed with he
customer, Example ~ normal requiements for aesutt management system may
be enry of math, calculation of results, ee
Expected requirements —
‘These requirements are co obvious thatthe customer need not expicly state
thor. Example - protection from unauthorized access
Exciting requirements
includes features that are beyond customer's expectations and prove to be very
P Workeretoseaee7¢
teGEam DSA OataStuctwer Sgorthes Interv Peportion DataSciance Topicwie Proce Che fora Python Compete Programming JovScript Machine > ~
aad Giese Procice Video Couns a0
‘vor eeu
4. Quality Function Deployment:
In thistechnique customer satistaction|s of prime concern, hence it emphasizes on ez
the requirements which ate valuable tothe customer
Stypesofrequlrementsare ientitied~
+ Normal requirements ~
Inthis tne adjective ans gosto he proposed srtware are sscussed with the
BOO customer, Example ~noxmal requitements fora esult management system may
Cia) be entry of marks, calculation of results, et
+ Expected:
‘These requirements are so obvious that the customer need not expily state
thor. Example - protection from unauthorized access
+ Exciting requirements =
Itinctues teatures that are beyond customer's expectations and prove oe very
satisying when present. Example ~ when unauthorized access detected,
‘houla backup ana shutdown ail processes
‘The major steps invotvodin this procedure are~
P Workeretoseaee7¢
teGEam DSA OataStuctwer Sgorthes Interv Peportion DataSciance Topicwie Proce Che fora Python Compete Programming JovScript Machine > ~
Read Disewse Practice Video Courses ae
Bons
arc
Cia) ‘The major steps involvedin this procedure are -
4. Identify athe stakeholders, eg, Users, developers, customers ee
2. List out all requirements tom customer
5. Aalue indicating degree oF importance is assgnes to each requirement.
‘4. Inthe end the tna isto coquirementsiscategortzed as ~
+ rtispossioietoachiove
+ ltshould be deterred and the reason frit
+ ttistmpossibieto achieve and should be dropped ott
5. Use Case Approach:
P Workeretoseaee7¢
teGEam DSA OataStuctwer Sgorthes Interv Peportion DataSciance Topicwie Proce Che fora Python Compete Programming JovScript Machine > ~
aad Giese Procice Video Count a0
The majrstes involvedin this procedure are~
4. Avalue indicating degree of importance s assigned to each requirement
1-ldentiyall he stakeholders, 69 Us
‘Inthe end the tna ist of requtrementsis categorized as~
+ Itispossiotetoachieve
arc + ttshoute be aeterred and tho reason frit
cet] + t1istmpossititoaeniove and should be dropped ott
5. Uso Case Approsch:
This technique combines text and pictures to provide a beter understanding ofthe
requirements,
The use cases describe the ‘what, of system and not how Mence, they ony lve
functional view of the system,
The components ofthe usecase design includes three major things ~ Actor, Use
«cases, use case diagram,
1 Aetor=
P Workeretoseaee7¢
teGEam DSA OataStuctwer Sgorthes Interv Peportion DataSciance Topicwie Proce Che fora Python Compete Programming JovScript Machine > ~
Seod Discs Protce Video Coutes oe
7 Tehoutd be deferred and the reason frit exmeo
+ Itsimpoteble to senieve and shouldbe dropped att
«ecu tepec Ge
This technique combines text and pictures to providea beter understanding ofthe
requirements, >
‘Te use cases deseibe the what, ofa system and not‘now Hence, they ony givea
See Tunetiona view ofthe system,
aren The components ofthe usecase design includes three major things ~ Actor, Use
cases, usecase diagram,
1 Aetor=
It the external agent that les outside the system but inte
way. Ansetor maybe. person, machin ee. ile represantac ae etik gure
‘Actors can be primary actors or secondary actors,
‘+ Primary actors lt requires assistance from the system te achieve a goa
'+ Secondary actor It isan actor from which the system nec
2.Uge eases -
P WorkeretoseaeSSIES KERN a 1} |
‘view Praporation Data
TopicwinePratce Ci+ Jove Python Campeliveregramming JvaScipt MactneLeating SDE Sh
Pusies GFGSchoo! Price >”
ead Giecas Procice Video a0
a vol ince Pracice ViduoCouree
| migTECheuque comaies text ano pitures Yo provae a peter unoerstanoing or ne
requirements,
ox
‘Te use cases deceibe the what, of system and notnow Hence, they ony give
ita functional view of the systom,
The components ofthe usecase design includes three major things ~ Actor, Use
cases, usecase diagram,
Book An 1 Aetor- Book An
Offline Ite the external agent that les outside the ystem put intersct with tin some Offline
a ‘way. Anactor maybe. person, machine etc. is represented asa stick gure. Session
Actors can be primary actors or secondary actors.
Today ‘+ Primary actors It requires assistance from the ystem te achieve a goal. Today
Whingto ara ‘+ Secondary actor It isan ator from which the system neadsasestance. Taking ae
2.Use eases -
They describe the sequence o interactions between actors and the system. They
capture whnactors) do what(interaction} withthe system, Acomplete set of use
cases specifies all possible way fuse the system
=~ 2. Use case diagram ==
‘Ase case dlaaram arachically renresentswhal happens when an actor interacts
P WorkeretoseaeSERRATE! — on «
re :
‘view Praporation Data
TopicwinePrstce Cs+ Jove Python CampaltiveFrgrarmiag JowaScrpt MochneLoaming SDEShes! Purdes GFGSchosl Proce >”
> ee eee ‘
‘+ Secondary actor It san actor from which the system naadsasestance. ad
2,Use casos ~
‘They describe the sequence ot interactions between actors andthe system. They
Hyderabad to capture wno(actors) do what(interaction) with the system, Acomplete set of use
Visakhapatnam cases specifies ll possible ways use the system
2. Use ease diagram —
from RS7738
‘use cate disgram graphically represents what happens when an actor interacts
== with system. it captures the functional aspect at he system
‘+ Astick figure is used to represent an actor
+ Anovalisused to represent use case,
+ Atineis uses to representa relationship between anactorand ause case
Mysore to Gos For more information on use case diagram, reer to Designing ise Cases tora
Praject
from Rs5.659
P WorkeretoseaeSEER oreo
eee
Bowie ‘Stor noteonsonware ttn in sotwareEagneetng =X QS
ry pees
Prototyping 5 :
+The process in which developers create a model af the actual
software
+ The intention behind creating this model isto get the actual teeter
requirements more deeply rom user.
+ Prototyping help a lot in getting the feedback from the a imei
customer
‘scfm
ae ea
Prototyping in Software Engineering with Example | hind / Urde
fy Sa rea
a veSRST oreo
eee
300
= Bioiiie ‘Stor noteonsonware ttn in sotwareEagneetng =X QS £ (Osmm
ty Acne Vy
Process of software prototyping
1. Initial raquirementsentifestion
2. Prototype development Soe eng
on f ese
=
Rig Dies cigeoengentanie nia
op herent
a ve
aSRST oreo
e9¢@
Diodise Horie cnsohwaerepagiesatwaeEnpmeeG XQ) &
rs pees
Types of prototyping 5 ad
1. Rapid Prototyping/Throwaway In this type we bud»
prototype with very tle efforts to get the requrements
from the customer aftr geting the requirements we
throwaway this prototype and start building the actual eer
pes
2. yolutionary Prototyping: The prototype on the top af ean peti ns
which we can Build the whole actual system. poten
‘scfm
ae ea
Prototyping in Software E
ering with Exemple | hindi Urdu
fy Sa rea
a vee5¢
{ WitetEam DSA OotaStuctaer Agorthns Interview Peparation DataSciance Topicwie Proce Che Joa Python
serene engneormg cup
rd cohen a0
complete detats about it
Thoretore Software requirement analysis simply means complete study, analyzing,
describing software requirements so that requlrementsthat ae genuine and needed
«an befutiled to solve problem, There are several activites ivolveain analyzing
Sortware requitements, Some of them ae given below
Store Engng clonal
ote del
o)
—
(552
Competitive rogramning JavaScript Machine)”
Per ecarrienen eens al
prensa yme5¢ 20:
Wie Eom DSA DotaStciuse Agorithms Interaw Peparaion Data Scionce Topic-wiePocize Cis Java Python Competii Programming Javscript Machine > *
Road Discuse Practice Video Courses ae ¢
—- se
as SEs
AaB
loa Analysts Proton Rcegtion
Awerds ‘The main aim of requirement analysis is to Fully understand main objective of
———s ‘beneficial, does it increase quality of the project, does it will have any other effect.
All these point are fully recognized in problem recognition so that requirements
that are essential canbe fulfill to solve business problems.
Dont just ave, invest
Evaluation ond Synthesis
Evaluation means judgement about something whether tie worth or not and WHAT'S NEW
synthosis means to crate orform something, Here are some asks are given tat
Isimportantin the evaluation and synthesis of sortware requirement ace
‘+ Torin all unctons of sortware that necessary. ‘Preperation Sal Poced
+ Togetine al data objets nat are present externally and are easily observable. cone
P Workeretoseaee5¢ 10:
4 WiteEom DSA OotaSructuee Agora Interview Paporation DotaSciance Topicwie Posie Che Joa Python Compatine Programming JovScrigt Machine > ~
ow
—= aad Giese Procice Video Count
_ uo
Cr 2
ania, 1. Problem Recognition
W
ra ‘The main aim of requirement anayssis to fully understand main objective ot
at requirement thatncludes why itisneeded, doesit ada value to produc, wilitbe cares
Analysts beneficial, doest increase quality ofthe project, does it withave anyother effec. br
Awards:
Allthese points are fully recognized in problem recognitions that requirements
that are essential con be fulfill to solve business problems.
Evaluation and Synthesis
Evaluation means judgement about something whether itis worth arnt and WHAT'S NEW
synthesis means to create or form something, Here are some tasks are given that
Isimportantin the evaluation and synthesis of software requirement os
Toetine al functions of software that neceseay. ‘reparation Self Paced
Todetine al data objects that are present externally and are easily observable.
Toevaluate that low of data fe worth o ot.
Totully understans overall benavie of system that means overall working of
system. ‘gone a ced
P Workeretoseaee5¢
4 WiteGEom DSA DataSets Agora Interview Pporation DotaSciance Topicwie Poca Che Joa Python Compatie Programming JovScrigt Machine > ~
=—— fod Dic Price Vino Counmn a0
= mn LZ
‘+ Toevaluate that flow of data is worth or not. ==
system interacts with two ar more components or with one another.
5. Modi
After complete gathering af information rom above tasks, functional and
bbehavoral models are established after checking function and behavior af system
using a domain model tat alza known a the conceptual model
P Workeretoseae{WitesEam DSA OotaStucturee Algor Interview Pparaton DotaSciance Topicwie Proce Che Joa Python Compete Programming JovScript Machine >
‘asic
i od Dhcae Prcice Wino Cowsee 0 ions
‘Tosti and estalsncharactr of sysemintrtae to fully understand how Yow eta
system interacts with two or more components or with one another.
BI
3. Modeling
After complete gathering af information rom above tasks, functional and
bbehavioral models ae established after checking function and behavior of system
eat cate sto
using a domain model tat alza known a the conceptual model
‘option
4. Specification
‘The soars requirement speitcstion (S28) which means to apeciy the
requirement whether functional arnan-funetional should he develope
Ss. Review “Ty Digtalooeans For Free
Alte developing the SRS, lms be revieed to check wheter canbe improved ae >|
‘ornot and must be refined to make it better andincrease the quay,
—77
Prepare forfree
Interview Series expt r-exomst 2S, ae
P WorkeretoseaeSS ———- «SSE
Eom DSA ateStuctuee Algoritns Interview Paparaion staSciance Topic Proton Cou Jove Python
+ Data Dictionary
Itisa repository that consists ofa description fal data objects used or produces
by he software. tstores the collation af data present inthe software. tis avery
‘ruca element ofthe analysis model, t acts as a centralized repository and also
helpsin modeting data objects defined during sottware requirements,
+ Entity Relationship Diagram (ERD):
It dopicts the relationship between data objects and is used in conducting data
‘modeting activities. The attributes of each object in the Enity-Relationship
Bagram can be described using Data object description. It provides the basis for
activity related to data design
+ Data Flow Diagram (DF)
It doplets the tunctions that transform data How and also shows how data i
{Wanstotmes when moving trom input t@ output, provides the additonal
Imormation which is used during the analyse af the information domain ana
‘serves a8 a bask for the modeling of function, I also enadles the engineer
develop models of functional nd information domains atthe same time
P Workeretoseae
1, — oD
JovaSeriph Machine
‘Issued in publi interest and Education
byMert
oe5¢ 10:
te Programming JovaSeriph Machine
Eom SA CateStuctuee Algoritns Interview Paporaion Data Science Topic-wiaProctin Cos Jove Python Comp
os
{Issued in publi interest and Education
Dy Meri
Data Flow Diegram (OFO): wen SS
It deplets the functions that transform dataflow and It also shows how data is
transformed when moving trom Input to output. It provides the additonal
Information which is used during the analyse of the Information domain and
serves a5 a bacs for the madeling of function, I leo enables the engineer
‘develop modeler tunetional and information domains tthe same time
State Transition Diagram:
It shows various modes of behavior (states) ofthe system and alo shows the
transitions fram one state to another state inthe system. It alsa provides the
details of how the system behaves dus to the consequences of external events. t
represents the behavior ofa system by presenting Is states and the evens that
‘cause the system to change state, I also describes what actions are taken due
te accurrence of a particular event
Process Specifcat
It stores the description of each function present in the dataflow dlagram. tt
P WorkeretoseaeEom SA CateStuctuee Algoritns Interview Paporaion Data Science Topic-wiaProctin Cos Jove Python Comp
te Programming JovaSeriph Machine
aad Diets Procice Video Court a0
‘develop models ot tunetional and information domains atthe same time
+ State Transition Diagram:
It hows various modes of benavier (stats) ofthe system and aso shows the
Lwansiions trom one state to another stato Inthe system. It also provides the
details of now the system behaves due to the consequences of external events t
represents the behavior ofa system by presenting is states and the evens that
cause the system to change state. Italso describes what actions are taken due to
the eccurrence of a particular event
+ Process Specification
It stores the description of each function present in the dataflow dlagram. tt
‘eseribes. the input to @ runction, the algortym tnat is applied for the
\wanstotmatin o inp, and the output hats produce, Itaso shows regulations
and barriers imposed an the performance characteristics thal are applicable to
the process and layout constraints that could influence the way in which the
process wil be implemented
P WorkeretoseaeEom SA CateStuctuee Algoritns Interview Paporaion Data Science Topic-wiaProctin Cos Jove Python Comp
te Programming JovaSeriph Machine
aad Giese Procice Video Count a0
+ Process Speciticat
It stores the description of each function present in the dataflow dagram. 1
describes the input to a function, the algorithm that is applied for the :
transformation of inpul and the output thats produced. Italo shows regulations
‘and barriers imposed on the performance characteristics that are applicable to
the process and layout constraints that could influence the way in which the
process wil be implemented
+ Control Specification
1 stores agaitonat information about the controt aspects ofthe sortware. ti
used to indicate how the soriware behaves when an event occurs and which
processes are invoked due to the occurrence af the event, It also provides the
etal ofthe processes which are executed to manage events.
Data Object Description:
It stores and provides complete knowledge about a data object present and usea
Inthe sottware. i also gives us the detals et attributes of the data object present
P WorkeretoseaeSRE F< no + [BEG [SiN] Baie x] OnE EuaNE| ue] Se
xs xr
4 WitetEam DSA DataSets Agortho Interview Pparation DataSciance Topicwie Proce Che Joa Python Compe
Programming JavaScript Machine ®
aad Giecas Procice Video Couns a0
Scapa It stores the description of each function present in the data flow diagram. It Saad
prenretntonn
+ Process Speciticatio
+ Control Specification:
It stores adational information about the control sepects ot the sottware. It ke
led fo Indleate how the stfware behaves when an event eccure and whieh
processes are invoked due to the occurrence of the event, I also provides the
details ofthe processes which are executed tomanage events
Data Object Description:
It stores and provides complete knowledge about a data object present and used
Inthe software. Wt also gives us the detallsof attributes of he data object present
Inthe Entity Relationship Diagram. Hence, it Incorporates all the data objects and
‘oir attributes.
P Workeretoseae4 WiteEom DSA DataSets Ager Interview Paporation DotaSciance Topicwie Posie Che Joa Python Compete Programming JovScrigt Machine > ~
aad Giese Procice Video Count a0
Google
It stores adational information about the contro aspects ofthe software. It is
E Used to Indicate how the software behaves when an event accurs and which i
process willbe implemented.
processes are invoked due to the occurence of the event, I also proves the
‘etal or the processes which are executed to manage events
Data Object Description:
It stores and provides complete knowledge about a data object present and used
Inthe software. Ialso gives us the details of attributes of the data object present
Inthe Entity Relationship Diagram. Hence, it Incorporates all he data objects and
thelr attributes.
Prepare forfree
Interview Series terséir-exmsr | 2S,Maat 9. ble Oe tay
Falotonly tga. lve, Swcopbostae oD ta cal ofp
uk tut atid
War a. Hoag ool ak diag ys
ie ligase fe gules eat
ora yi ay
tsi Ahly
duties ie quite
i. sha_corspston ach ap ve sea
ilu dstob| De ob
Hi) tna he oj shay Ath “What ty fe aeatiorie
— chthet sl ct aya oa:
aaah aah iy le fo eects a fe
seta hanylet fd
Ds i, i al fini “a rel cs
a iar.Adobe ra repracrbiono- qbveact_any. corey.
“inj iveammiat by sephace, Acta." oye. be
aueaftinal uty. bog dn econ Tas estore 8
Ailyeiont call) on Leet Colanim ) 2 role Cog. sabyptstan,),.&.
files — httruser cline the opopete op. e~ date. igactonl
fade en tee, diver dives chalets tg tn he tlt
(nian ian “4 tte ck, 2) dtc a Carne
Breage te barman ee
Silt Pate_obyjrde ary comnscted AO Ore dnotieen site
pout says. Cauda fct-dalr_olyrle , heoard baokstste
nl aur diye“ a sskop eyed ond pade Sak eye tbe
Julseutitlabnaliy Jochieen deck ad beeslona fx clave”
factions onda owe, — A bechutsee lA book,
—_|\bstlalectscla books, "— a beokskne _aelu hoot, >
— A bonetine hoe goles:
pute pad
altri donstno ard oly weasne’) C4
ua weutrence @ ob A tau aalate to Mer Bo i Bewcrarves of
thf, A Hy fi Coal) rae aj cst
hina” scene 90 Se vedlly wa stakeniip 4 04, Kank
ili sk Ty oo sa testy ipl
ay 1 jens di tna.
usta jlo sap el
itt ye fuinahips at dante vd lal he cerling
Tass mmakove —epdiuéto, hr ecg lee cinblte aden
ashen dal bye ave
Fy sia cb
ely speed yrs hak idea.
Malian a stcbuaad
(edi US rsd,
Wer functioned vce. cenit out?
due als fasAbstr tec booke, — A _beokatre scbu" beotee,—>
— A bonatine hte Ago:
Aanaioe codon, dlyplye , Sechelt ard satus dpi te
siltass onntckions Bebo beckard, .bodkale.
i spechieaton My the neg
Lated..B Ve. rane
re LUD = Aemara.g
tandy ep On
focusmae 4 acta” Lote
hy scuvenee goby AP a ule bo tr rn. acu
fe, thy bong Covi) wctrce pcg cm taco
eho.” Sezione 440" Ca vielaley » a.sdeontap 0.4 Hawk
i aplasia eis oe sabre Span
fu moda th tf. an ccoumsande di. ai a pais
uly ehiacap “ase: ol, Vijute_ase spiced by a
anal fini al dst ihe. dhl he crmeling
shel, inte king, He cena ie conta
Bi lakh we th ieasip- Cmca dade ac.
Maange a ebuiadsatag Cooty el yl dice dleate.
sa
(adil Ud rely
© 200 sncte(Bee FO H| Riana WAM oon on etme] Cuma) e YS
ea a0:
© > SB yoututecam jan -orUASAY
cctmetonrumecasn SotwareEngesing-Engneetng smsemeX Qo) & © sonia
Bowie
Same the folowing rearing the deveepment ofa stbrare stem
BSI ose crrocton
2 Estimate lines of code oP: 33,480 LOC
for P 620 LOC pe person meth
Average prot
Jopers:6
ib of software
wvorage salary of a stare developer: 850.000 per month
ME, Dan Carethe estimated development
time (in month), and estimated development cost in € Lac) epectivey, then (ED, C)
development
inperon months
) 8% @ 6 8 @039
ring Numerical - LOC FP COCOMO | Software Engineering Numerical UGC NET PYOs
ERNE 8 0-tensyanes
Sn nominee peer
ED 2 tector ve
Pom come eee€ > © jouibecon
ouube cstmetonumetcals mn SotwareEngesing-Engnestng stsemeX Qh
«Estimated lines of code of P: 33480 LOC
Serenity
een
eee ae) aca
‘Step-3: Estimated development cost (in Lac) = $0000*6 ne
Software Engineering Numerical -LOC FP COCOMO | Software Engineering Numerical UGC NET PYQs
jan oman
ED 2 tector ve RE
ERNE 8 0-tensyanes
Bp sme DuisA Software project was estimated at 864 Funetion Point: person team will be
to project consisting of a requirement gathering person, one designer, two programmers and
two testers. The salary of the designer is €70,000 per month, requirement gatherer is
£50,000 per month, programmer is €60,000 per month and a tester is £60,000 per month.
Average productivity for the team is(12 FP per person month. Which of the following
represents the projected cost of the project?
(1) %33,20,000 (2) %43,20,000
(3) €33,10,000 (4) ©22,10,000Tote FP = 264
fra EP = 1a pa pesen Pr menkh
Fetal 6 pemon ong nal
duoekton to Compuke 864 FP
So tim
coe ele
pejeck
Cork of te Oi peomon + i digne + 2 agrenntrs
es Requironek outer
42 tke) & G12 .
60,000) t (axerve0d) x @iz
=x soyoory + (incision)A Company has a choice of two languages L; and L; to develop a software for their client
Number of LOC required to develop an application in L, is thrice the LOC in language L,
Also, software has to be maintained for next 10 years. Various parameters for two languages
are given below to decide which language should be preferred for development.
PARAMETER A A
‘Man-year needed for development | LOC/1000 | LOC/1000
Development cost Rs.70,000 | Rs.90,000
Cost of Maintenance per year Rs.1,00,000 | Rs.40,000
Total cost of project include cost of development and maintenance. What is th& LOC for Ly
for which cost of developing the software with both languages must be same?
(2) 6000
5000Like, Share Subseribe and click the bell icon to get all latest updates
Let LOC of L1=x,
so LOC of L2=3x
(x/1000)*70000 + 10*100000 = (3x/1000)*90000 + 10*40000
70X + 1000000 = 270 X + 40000
200X = 600000
py aci0)0]0)
ca
\Like, Share Subscribe and click the bell icon to get all latest updates
Wed (Conlsuachive Gort_mookth’)
ome
Used fir Coouboting cont
med daw
eu (Smal , Same clvelopenent Aone pratour
Spent bef ith prec pruvour dlaveloperne
Fancttonadaky not Hone
Ongos t
semi dabachecl (Some
Coveted! (wesw tyre ond
L
alee Mite Ponmuler of Cocomo (con L
os a = Ha (kts) ® Ow te vrssbphicabve Focton| te
Effet) —— ie vy te _exporenhal oekon ie
pacotve chen ffm
Speen
D ty Keke, moully)
ya ae eagorartot eke
reelopment =
ey Fe A wdL ee Gen
wn exam.PPP SEAN UNE et ROR Acs ee Uae Reece eC LULU)
function points and is planning to use JAVA as the programming language whose
OT LORt Cs omc Tae cCo EMR ROCs cr teams
as multiplicative factor,b = 1.0 as exponention factor for the basic COCOMO effort
Pe CeCe eMOECR Ma Une eran EORTC e eee oa
PeePKOCeO ORT scone oNa tia ore eich sri CTs el ck
eon ced
(1) 11.2 months (2) 12.2 months
(eSB EMR (CBU mentont
Nee eaeQ) The number of function points of a proposed system is calculated as 500. Suppose that
the system is planned to be developed in Java and the LOC/EP ratio of Java is 0. Estimate
Hea Reo ed sec cca nz Lire CoemCR arse)
given below : E = a(KLOC)? Assume that the values of a and b are 2.5 and 1.0 respectively.
EYP LS oc mney
B) 75 person months
Olesen iy
Donny 7
> moBeas SERRE) 0 nares
© @ Fe ClkerOay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO se
Tier noe
tide
som
mie
Sete
Tibet
PD woeheretosenen
SOFTWARE DESIGN AND SOFTWARE ENGINEERING
Sonware design sts atthe echnical Kamel ofsotware engineering ands appa
Eachfthe clement ofthe anass model (chapter 12) provies Information tat
ss necessary to crenie te four design models equea fer a complete specicatlon at
‘design. Te foe oinfrmation ding software dest fuse in Figure 13.1
food the dea ask Using one of number of design methods (scsed in ner
‘haptr) the design ask prodces a data design an architectiral din a inte
face desgn. and 3 component design
"et design transforms the information demain mel created ding nabs
into the data smactres tha lhe ries t implement te aware The data
‘ec and telatonships defines inthe entity eatonship chagram and the detailed
{ata content epictinthe dts dona pend the Dao the cata ess ct
ity, Pa of da design may occur in conjnction wth the design of sftware arch
tecture Mote deta data design occurs seach software components designed.
‘hearths design defines the reatonsp between majors eeentsPimkcwans WGBee NSS SENEaR) 0 novemos x [es uRMn) |G) ae |B Sa
arutctual design patems canbe applied (SHAMS). The afeitectural desig ep
Pimkcwans WGee
© wes
© @ Fe ClkerOay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO se
PD woeheretosenen
hnvebeondemestoethe stem, andthe conerintsthat ecthe wy which
areatectural design patems canbe app (SHAY). The aciieturl design ep
riaion—the iamework of computer based sjstem—can be dvved om the
within the analysis mode
tse toa procera description of sciware components information tained
Dring dest we make decisions that wll imately afet the scces of sf
nied Bt why dew 0 pra?
The importance af scware design canbe tated with a single word—quaty
Design the pace where quay fostered n soware engineering, Design po
‘vides us with representations oftware that canbe asessed for qa. Desig i
neon way tat we can accurate translate a customer reiements to 3
she stare predict or sytem, Sorte design serves asthe Fundtion foalFitwcton x] 2 teins x | A Banpgae XO oersmos x |B
© @ Fe ClkerOay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO se
‘werk bling anunsabesystem-cne that il fal hen smal changes are made
the sfiware proces, when tes short and many dallarshave already been spent
13.2 THE DESIGN PROCESS
‘Sothware desig ta erative procees through which regiments ave transite
‘sencurofeotare. That, the design eepetentedat highlewel of sheracton-
at, unconal and behavioral equements. As design teraton occur, subsequent
1821 Design and Software Guaity
‘Tvoughout the design proces, the quality ofthe evoling design is assessed wih
cGlaupbln PCCD] suggests tee characteris tat eve a ude the eral
PD woeheretosenen7S
© @ Fe | ChlerCayDonninte Sota
PD Woeheretosenen
WARE 0 cassie
Quote:
“Bonen!
fen not ne
Stetina
Shenae
a
tear
ver
seers Prersn APRACTONERS_APPRORCHS2O2 get
ata, incon and behavioral requirements, As designations occ. sabsequet|
rementnt lends design representation at mich wer level sbetacton These
‘an sl traced to requirement the connection fe more sb
132.1 Design and Softwene Quality
“Tvoughout the design proces, the quay ofthe evolving design assessed wih 2
vies of formal technical rele or design walkthrough decseesm chapter
DMcClughin CGD | suggests ce carats ht Sene a gud othe
vation ofa good design
+The cesign must implement al of the expt equirements contsned nthe
nays model and t mist accommodate al othe pict requirement
code an fr those who test and ubsequery suppor the
‘he da, incon and behavior! domains fram an impementation
1A design should bit an archectralsrctre that (1) hasbeen crests| 6 Somes | FY Stang
°
© @ Fe CHker/Oay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe
code and fr those who test and ubsequerty suppor the soar
‘he da, fimctonal and behavioral domain fem an impementation
peepectve
cof ese goals achieved?
tn some cal or the me being, we preset the floring gules.
1A desig should bit an archectralsrctre that () hasbeen estes
tng fecognizable design patlems, 2 is composed of components tat
tet good design characteristics (hese ate dscsee ater in his chapte,
Implementation a tesing .Picton | Somes | A tanpagae XO aersmos x |e Benet oe x
© @ Fe CHker/Oay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe
and (8) can be implemented in an evolutionary fashion. thereby facilitating
implementers a testing
fA design sould ne moda that the sonar shouldbe lag pat
teraciys A design should cota itn! representations of data, achitecture, ner
st aces and components modes)
Oeste
france A des should lead to data tractors that ae appropriate fr the cect
Severn be plemented and ate drawn om ecnizabe data ples,
= ad to components that exhib independent orton
= Adee sho io component xt sens a
‘gat A design shou lead to nteracesthat reduce the complexity of eannetons
fepenn s teen modules ad wth the extra environment.
Goran S="e ata
ted oe A design should be devine uring 3 repeatable method thal is driven by nr
het’ ratio etancd uring sotware eqements anata
PD WoeheretosenenES
© @ Fe CHker/Oay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe
PD Woeheretosenen
oxen
aero
mans
‘ale
Soren or
(een et
ta roe
par
A deg shold contain distin representations data, archtectre, ter
faces, and components toes)
‘design shoul lead to dts strict that are appropiate forthe bjt to
besmplemented and re dawn om recogible ts pater,
‘design shou lead to components that exhibit independent fnctionl
between modules nd wth the extra ensironment.
‘A destn stould be crv using 2 repeatbe meth tha ven by er
ration btancd dering sotware requirments nates
‘hese cea ae not achieved hy hance. The saware design poceesencarage=|
1 design thrgh the aplication of fondamental design princes, jstematic
methodology, and though een
182.2 The Evolution o Software Design
The even of afar design i continng process that ha panied hepES
© @ Fe CHker/Oay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe
PD woeteretosencn
%
POINT
Seay
Sbbeba hed
Sedat
edi
‘herein
Davis [DAVIE] sigest set! of principles for software design which have Beer
‘adapted and extended in the following Lit.
Ces Sol consie aenatve pproactes jung cach es on he
reiemen fhe pete the resources sale todo the, andthe
The design shoud be traceable tothe anaes model. case angle
Clement of he desig adel ten acest multe regents se
the design mode .
The design shuld ot event the whee. Spe st contre ng
aoc den pte, many of which Relic been encountered befor
‘Time is short and resources are limited Desigh time should be invested in
“The design should minimize the intelectual distance” [DAV95]
tetwecn the sftware and he problem at exes the real wot
Thal the race ofthe soar eign shu (wheneve pss)
Inet scrote pti dona.
“he design sould exit uniformity and intertin, A designs
and forma shuld be dtd a eign tam eee design work gs. A
components» -ES
© @ Fe CHker/Oay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe
PD woeteretosencn
%
POINT
Seay
Sbbeba hed
Sedat
edi
‘herein
Davis [DAVIE] sigest set! of principles for software design which have Beer
‘adapted and extended in the following Lit.
Ces Sol consie aenatve pproactes jung cach es on he
reiemen fhe pete the resources sale todo the, andthe
The design shoud be traceable tothe anaes model. case angle
Clement of he desig adel ten acest multe regents se
the design mode .
The design shuld ot event the whee. Spe st contre ng
aoc den pte, many of which Relic been encountered befor
‘Time is short and resources are limited Desigh time should be invested in
“The design should minimize the intelectual distance” [DAV95]
tetwecn the sftware and he problem at exes the real wot
Thal the race ofthe soar eign shu (wheneve pss)
Inet scrote pti dona.
“he design sould exit uniformity and intertin, A designs
and forma shuld be dtd a eign tam eee design work gs. A
components» -wa kee |e
© @ Fe | ChlerCayDonninte Sota
PD woeheretosenen
BEY 0 pews
seers Prersn APRACTONERS_APPRORCHS2O2 get
pase}
pean
“The design shouldbe structured to accommodate change. Te ign
concep dics nthe nes section enable desig o ahve this principe
+The design should be structured to degrade gently, even when aber
‘inte, creat, or opeling condtine ere cacentered, Wel
Design ie nt coding, coding ie not design. Even when dea! proce
hc ise agit a sere at Te wy a dat
rocedira design to be eed
"he design should be assessed for quay ait is Being created, not
“The design shouldbe reviewed 1 minimize conceptual (smanti)
‘errors. Theres sometnes tendency focus on mine whe he desig
‘reviewed missing te fre forthe trees. A desig ea hol nae tat.
mGPicton x | C Satine x
Fi Samegue:
© Or
jase}
peondnset
PD woeheretosenen
Cyeenel/DouncadSohuare fngnetng_-Peuran PRACTINONERS_APPROACHS2I0 pa
‘The design shouldbe structured to accommodate change. The deign
‘The design shouldbe structured to degrade gently even when aber
‘ant data, events, or operating conditions are encountered. el
‘esgnessotvare should never “bom shi be designs 1
Design is not coding, coding is not desig. Even when dialed proce
he design mis higher than source coe The cn design decsons made
rocedira design to be eed,
“The design shouldbe asessed for qualy as is being created, not
after the fac. A varetyof dese concepts Section 3.4 design mens
“The design shouldbe reviewed t minimize conceptual (smanti)
reviewed missing the forest fo the wes. design team should ensue that
ogeam components, he level o abstraction at
tha exis bh exema rita qu tre DEVE. xem qu fe
are those properties ofthe ota tht can be realy bene by are e
reat comectess, aby
Intra quay oc ane of mpertance t tareDeere
ABSTRACTION
Many levels of abstraction
ighest level of abstraction : Solution is stated in broad terms
using the language of the problem environment
Lower levels of abstraction : More detailed description of the
solution is provided
Procedural abstraction
-- Refers to a sequence of instructions that a specific and
limited function
An example of a procedural abstraction would be the word open
for a door. Open implies a long sequence of procedural steps (e.9.,
walk to the door, reach out and grasp knob, turn knob and pull door,© FSA youttecamjaservgtoonst 3
Bowie ‘Abstain Rta Moan 6. software Aentctuee CoM
Software architecture is the structure or organization of program
components (modules), the manner in which these components
erat adhe Sucre of data tht are ued by We components
‘Shaw and Garlan (Sha95a] describe a set of properties that should
be speciied as part of an architectural design:
+ Structural properties: e.9,, modules, objects, fiters
¥ Extra-functional properties: how the design architecture
achieves requirements fer performance, capacity, reliability, "
‘security, adaptability, and other system characteristics.
Families of related systems.
Design Concepts in Design Enginosring par-1
EEA 2 tec tos0 ve
BA sme DomlndMODULARITY
Divides software into separately named and addressable
components, sometimes called modules.
Modules are integrated to satisfy problem requirements.
Consider two problems pi and p2. If the complexity of p1 is cp1 and
of p2 Js cp2 then effort to solve p1=cp1 and effort to solve p2=cp2.
If cp1>cp2 then epi>ep2
The complexity of two problems when they are combined Is often
greater than the sum of the perceived complexity when each Is taken
separately
Based on Divide and Conquer strategy : it is easier to solve a
complex problem when broken into sub-modulesINFORMATION HIDING
Information contained within a module is inaccessible to other
modules who do not need such information
Achieved by defining a set of Independent modules that
communicate with one another only that information necessary
to achieve software function.
Provides the greatest benefits when modifications are required
during testing and later
Errors introduced during modification are less likely to propagate
to other location within the software.© FS A youttecamjatn asian aI
Bowie ‘Anstictin tienen Mo
Design Concepts aul
REFINEMENT & REFACTORING
Lotus Makeup tw
Refinement .
Process of elaboration from high level abstraction to the
lowest level abstraction
High level abstraction begins with a statement of functions.
Refinement causes the designer to elaborate providing more =
‘and more details at successive level of abstractions,
Abstraction and refinement are complementary concepts.
Le ss
Design Concepts in Design Engineering patt 2 la
EE
Ce =) GaP Aimy vonied
EEN © 2=tectosenen ve =Bue X/Ceen N/A BawanR) 0 pare
© @ Fe | CherOotDonniadeS,
Cone
pete
alae
‘Seton
‘en
0 oe os
PD woeheretosenen
seerns_- Prenat APRACTONERS_ APPROACH pct
ortehnial process hat the stem must accommodate, Finally, noma made
‘numberof dieren archiet senpc
oped io present these model (S149
gu (ADL) have been deve
Altough many dierent ADL: Rave been
repose. the majority provide mechanisms fr desoing stem components xt
the manner in which hy are connected Wo one another
1345 Control Hierarchy
{Com hen len ale progr srr, epresnts the organiation of
mcomponents mies and imps a erarhy of con. does ot epresent
Droceiral arpects of entre ich as eequence of processes, occurence oor
dco pla pert er
necessanly applicable to al 3h
flee tations ae sed orepresent conto hitch for those architect
lve tat are amenable otis representation, The mest common she eel da
7 igre 12) thot represents raenca cont fr ell an etm architec
tower tofaclate ltr dsc
133, dep and wih provide an indication of the numberof evel of cond and
14C85| may also be used with equal efeciveneRS BEER) 0 namsme x
© @ Fe ClkerOayDonnnteSotaaeeEngneeens_Peaman APRACTITONERS_APPROACHS2O2 pe
ble that contro another morte si 0 be
role controled by anthers sd tobe senate othe conte [YOU For
‘example relersngo Figure 13.3 module is superna to modes. b anc
‘xl subordinate to module c and is uhimatelysuhorinaeto module
‘whsth-onented elatonenps eg, beeen modies dnc) hough posable to
‘apres in practice, ned nt be dened wa exp teminclgy
"he contol rary sls epresenstwo sub ciferen characte ofthe
‘state architecture vl and connect Moby estes the set ofp
‘omnponets that may be nvoked or wed as databy a gven component even when
this accompiehed ndretly For example, a modem an cbect mentor
may tave accesso a wie aay of daa abjectsthat Eas need, Dul makes use
‘fenlyemal number these data objets. lth objet sre vibe the mn
Le Connezniy indicates these ofcomponents hat ae ect invoked o used as
atabya gen component For example, a moduethal del causes another mod
ble to begin exec comectd 0
19446 Structural Partitioning
‘Wloned both horizontally and vertcally.Refetng to Flgue 13a, hrzntl pat
sng ens earache hemor each for exh major rogram
odes vepresnted ina darker shade reused to cootdnate comRS BEER) 0 namsme x
© @ Fe ClkerOayDonnnteSotaaeeEngneeens_Peaman APRACTITONERS_APPROACHS2O2 pe
1346 Structural Partioning
Whe architectural aye of aystem te herarchica, the program structure can be ar
tioned both hrizcrtaly and versal Referring o Fire 134, oriental port
toning deine separate branches ofthe molar Herre for each major program
function, camo modes represntsina darkersnae ate esta coorinse com
munication between and exectcr othe functions. Te simplest approach oho
Zonta parttoningcetes tree partons np ia rasta on cal
roves and opt Partoning the archtestore herent provides namber
+ propagation fewer side elects
‘complex and exersons tothe system [3 common acctrence end ta be ee 0
accomplish witht sdeeflecs. On the negative sie, horizontal poritoning often
‘hures mote data abe passed arossmoddentertaces and can comphese the ver
al cma f program fw processing rexites rap movement fom one ne
‘onto ancther
PD woeheretosenenBeas RE ERR Sn) 0 naam
© @ Fe ClkerOayDonnnteSotaaeeEngneeens_Peaman APRACTITONERS_APPROACHS2O2 pe
1346 Structural Partitioning
Whe architect! se of assim ishierarhica. the program structure can
tioned both erizcraly and versaly Refering o Fire 134, orion prt
toning deine separate branches ofthe modular rare for each msjor ro
function, camo moses repesntsina darker se are sda coon
munication between and exectcr othe functions. Te simplest approach oho
Zonta parttoningcetes tree partons np ia rasta on cal
roves and opt Partoning the archtestore herent provides namber
+ propagation fewer side elects
‘complex and exersons tothe system [3 common acctrence end ta be ee 0
accomplish witht sdeeflecs. On the negative sie, horizontal poritoning often
‘hures mote data abe passed arossmoddentertaces and can comphese the ver
‘onto ancther
ro of program flow processing requies rap movement fom ne uneAmes x) 2 enn x | sane
© @ Fe | CHkeeCay Donna Sota
PD woeheretosenen
5 Prcma AERACTITONERS_APPROKCHS2O2 pct
%
POINT
“be
wa ae
ea ed
twtr
‘pe sit
vores pottonra
eral patos gue 13.4), oten called facing suggests that contol (ec
soning and work soul be debate top-down nthe program strict Top
level modules should perfor contol functions and do ite actu prcesing work,
ole that reside own te erie shoud the worker, performing al nt
‘The nave of change In program stucturesjstls the need fr vertical pat
(hgh inthe structure) wil have a higher probably of propagating side elects to
‘changes to computer programs revolve around changes to int, computation ot
remintainabie-atey ualiy factor
1347 Data Structie
na rte ea representation ofthe ogc relationship among inci ele
mens of data Because th tute ofnfrmation wiliatiablyafet the bal po
‘dural design, data stactre t 36 myportant ae program srictine to theRS BEER) 0 nomenon x
© @ Fe CHker/Cay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe
1347 Datastuchie
Di tie 3 representation ofthe logical relstonehip among inci ele
cedural design, data structure 1 35 important as program structure 10 the
Data strcture dictates the ngoizaion, metho of acess, degree of acacia
ty, and processing altemstives or information Ene ete, HOSS), RUB),
IGANSs} have teen dedicated ta these topics, anda complete scission beyond
the scope of hie book However, ie portant to understand the cae metho
"Te crganization and complexity of datastrctre ae limited ony by henge
ruiy ofthe designer Thre ate, however alimted number of csc data sucures
‘Teele ena form the bing locke tormoresophiniates trices.
‘omc ae
beames te
‘scar om is the sinplest ofall data srctues. As Rs name ips, a salar
PE) oo = esAmes x/ 2 een x | sane
© @ Fe | ChlerCayDonninte Sota
2D woeheretosencn
BEY 0 pews
seers = Prersn APRACTIONERS_APPRORCHS202 get
POINT
“tte
fewer
‘ua, sha
ia eg on
Modules that reside low in the structure shouldbe the workers, performing ll input
The nature of change n program SuUciures sti he need fo erica pat
anges to computer programs eveve around changes opt computation oF
ransfrmation and ouput. The overall contra sucture of te program (, task
tchavors fr ess ikely tochange For his eason vertically portioned srctres
a es ely tobe suscep to sds eflects when changes ae made and wl hee
or be mere mantainale—n key quay factor
1347 Data Structure
Di ie 3 representation ofthe ogc relstonehip among inci ele
cedural design, data stuctue I 25 important as program structure to theRS BEER) 0 nomenon x
© @ Fe CHker/Cay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe
bata stactre ictts the organization, methods faces, degree of asc
sy and processing ltematves for inonmation, Eke txts [AOE KRU),
Taney navereen dedicated totes opie, ada complete aecusson beyond
the scope ofthis book However tis imporant to understand the lsc method
ry ofthe designer There are, however shed rumber acs data ices
that fom the bldg Hooks for more sophie stroctr
item represents single clement of information that maybe addressed by an ert
Tar tats, aeees may be achieved by spectying 3 singe adress n memon? he
Deeds rca format of 9 scalar tem may vary within bounds that ae ectated By 9 pro
syanning language For example, «cla tem may be a logical ent ene it on
a integer oroating pon amber tat is 8064 slong. or acharacter sing that
is hundreds or hoaronds of byes ong.
When scala teme ae ngonnes ne a it conic group, a savin tr
stormed. vectors are the most comme of ll data srctsres and open the cont
‘onl ngexng of nvormation
hen the sequertia vector sesende to wo, the, nd ulmately an arbaray
umber of diensions an. dienstond: paces creed. The most common -dnen
‘Sonal pace sth wo dmensional matric In may programming langage, nn
fl dats sroctres As te name implies, 3 ast
Toms vecors and spaces maybe organized in variety forts. A nk
Pioenen © eeeRS BEER) 0 nomenon x
© @ Fe CHker/Cay Donnas Engneeens_Peeman APRACTITONERS_APPROACHSIO2 pe
Sang longue For examples lor fem may bes geal en ere Bee
hen cla ems reorganized as also congue grep, acyl ctr
varie inden ofnmation
butero dimensions an diesen spa screed. hemos common nen
onal spaces the wor mensional mati n many programming langage an
tems, vectors, and spaces may be organized in a variety of formats. A linked ist
manner ale rie tht enables them tobe procesed 38.018. Each Made
indicate the adsress in storage of the next node i the list. Nodes may be adkled at
any pon in the Tis by redefining pointes to accamodate the net is ny
TSodeuasge tres ft deseo. Forex, emrchldotr ruc mplemented
SEREag ctngrtinkdiste tae continsaarems vers ané possi ndmnensor]
SSeiwumers spaces Atseahcal srt commeniyencouterstn apa at eae
mined "information categorization ad associa
mrp x Ysented at diferent levels of abstraction. For example, a stack sa conceptual
(miner rand ofa dats sirictre that an he iplemented a 9 vector or lnk i
Seeioyen Depending onthe lve! of design deat nema! workings ofa tack mayor
say net be species
P tear » EE EEEee eae 700:
Drouin coral ncependnecneon and eauggwiEMecoe XQ.) & @ sone
Queue x
Effective Modular Design Sa
er mplernentation by encouraging persia development of t Sate oe
lifferent parts of 9 system. esnconets a
Fictional Independence
The, concept of functional Independence Isa direct cuterowth of
prodilanty andthe concepts of sbstracion ond informotion Nang
aflame sah cee chee tr ee sive at 2
Een iisect hee
Jayot Vidyapeeth Effective Modular Design
Orr cores 2/9) Bam Lome
ED 2 etc tose ve© FS A youutecamjascrv=Couveontee waes
= Bioiie Ds
Effective Modular Design (Cont..
Cohesion is_a measure of the relative functional
‘Sangin of module, “ra Viggen oda
‘cohesive module performs single task within a mam
fotare procedure —
We atways strive for hgh cohesion although the
Imirange ofthe cohesion is eften acceptable
Cohesion may be represented asa spectrun
‘module that perform a set of tasks that relate to
{Shen other ocely I caleo coincidentally
‘cohesive.
‘Amodul that pertorms tasks that are related
‘ogtcally i togially cohesive,
Jayot Vidyapeeth Effective Modular Design
pom
ED 2 etc tose ve© FS A youutecamjascrv=Couveontee
= Bioiie a
Effective Modular Design (Cont..
+ Wen a module contains tasks that ae related by the fact
{les temporal cohesion ° 7 Ov:
+ nen processing elements of module are relates anc
must be executed in spect order, procedural cohesion.
+ When al processing elements concentrate on one area of
2 data structure, communteational cohesion 's preset.
igh cohesion scharacterzed by a madule that performs
one distinct procedural tack.
Jayot Vidyapeeth Effective Modular Design
Orr cores 2/9) Bam ome
ED 2 etc tose ve
wae© FS A youutecamjascrv=Couveontee
= Bioiie
Effective Modular Design (Cont...)
(2) Coupting
‘Coupling Is 2 measure of interconnection (the relative }
interdependence) among madvles
‘Coupting depends on the interface complexty between
modules, the pont at which entry or reference Is made
{ora module, and what data pase across te Interface
In sonware design we sve for lowest possiie
coupling.
Jayot Vidyapeeth Effective Modular Design
Orr cores 2/9) Asm Lome
FEN 2 2= tec tosenen ve
wae© FS A youutecamjascrv=Couveontee
= Bioiie
Effective Modular Design (Cont...)
+ Coupling Is characterized by passage of control between
modules is calle control coupling.
+ In gure a ‘control ag” (a variable that controls decisions
in a subordinate or superordinate module) Is passes
+ When males are tied to an environment external to
software igh eves of coupling occur
for eg. /0 couples a module to spectic devices, :
formats, and communteation protocdl,
+ External coupling is essential but shouldbe mites 9 &
‘Smal number of modules wth a stocture
a dao
Jayot Vidyapeeth Effective Modular Design
35
g
Orr cores 2/9) Asm Lome
ED 2 etc tose veeaee 700:
Boutin Sr steon Oats Des rst eohneanig xl as B som
=
sername 8
eta design in Software Engineering iceaee 700:
Boutin Sr steon Oats Des rst eohneanig xl as B som
=
sername 8
eta design in Software Engineering icFite x | E otnate x | @ patmimge x | A Eawewes x @ DNase
69 SB yoututecamaschv=sntToa
Bowie Sort won Osta Desgrsotnaeenhneering
this cater, the buns
ining techrges, a9 called inarege
DD) that nave thiogh ening dass
eta design in Software Engineering
EEA 2 b2=tecosere ve
x Haney [IL Aegnren |
eae
NF nn crane
eae:
wee]
xmas 8
heme 8ww oaasconns |S Hoae en | aeoemal |
Fitton | Somednne x | @ pun inge | Sane gues x
eae
69 SB yoututecamaschv=sntToa
Sr steon Oats Des rst eohneanig
Bowie
=
—
eta design in Software Engineering
EA 2 tcc vO© > SA youtcamjatn sarod
= Bioiiie Sort won Osta Desgrsotnaeenhneering x as Orme
—
‘modules that must make direct use ofthe
thin the structure Qo“... e>
eta design in Software Engineering© > SA youtcamjatn sarod
= Bioiiie Sort won Osta Desgrsotnaeenhneering
representation of a data structure should
‘modules that must make direct use of the
inthe structure
library of useful data structures and the o
20 them should be developedy
eta design in Software Engineering
xl as B som
yer @Sseuss now Tatar Mappings arid cut drag secu X
Steps Involved
> Step 1. Review the fundamental system model
> Step 2.Review and refine data flow diagrams forthe software.
>» Step 3. Determine whether DED has transform or transaction flow chara
>» Step 4. Isolate the transform center by specifying incoming and outgoing flow
» Step 5. Perform “frst
» Step 6. Perform “second-level factoring”
Step 7. Refine the frst iteration program structure using:
Architectural Mapping in Software Engineering ~ Mrs S. Rema Rose, AP/CSE, RMDEC
or. eS
FEI 2 ctectoxet
2) 4Ficton | E Someone | A tanpagae XO aersimos x |e Beamer x
© @ Fe CHkerOay Donnas Engneens_Peaman APRACTITONERS_APPROACHSIO2 pe
‘Step 1. Review the fundamental system model
‘Step 2. Review and refine dataflow dlagrams forthe software
‘Step 3. Determine whether the DED has transform or tranancton flow char.
‘ctersis, sep, 2, and 9 ate Mental to comesponding steps tn transform map
ping. The DFO shown la Figure 1.13 has aclasic wansacon fow characteris
However, fow along wo ofthe action paths emanating mn the ino command
processing bute appears io have wansform flow characters. Therefve. ow
‘Step 4, Ldentity the transaction center and the flow characteristics along
(each of the action pata, The location ote tanscton center can be nied
‘tet cerned tom the DFD. The wancacton center les tthe cig ofa aunber
‘of actions pats hat flow racial om For he ow shown in Figue 1413, he
The incoming path (the fow pahslng which a transaction isrceved) and
‘action pat ate also show nthe gure, Eachacton path must be evaluated fr ts
Inada ow characteristic For example, he passwous path shown enclose by
a shaded area in Figue 1413) as transform characterises. Incoming transom,
‘Step 5. Map the DFD in a program stricture amenable to transaction pro-
‘essing. Transaction ons mapped no an afeiectre that contain an incom
inghvanch anda dispatch branch. The tte of the nom branch developed
inch the sameway astraneformmapping Stating athetransacton center, bob
Dae a ry