DFDs
DFDs
Outline
• Known as DFDs
• A way to model a real world situation
• They are the interface between the real world activities and an
understanding of how this can be converted into a computer system.
Why do we use DFDs?
• It is a way of taking the physical view and converting it into a logical view.
• The physical view - all documents involved
• The logical view - the data they contain
• Their main purpose is to communicate with the user, the analyst’s
understanding of the scope of the required system
Where do they fit in?
• DFDs describe the flow of data or information into and out of a system
– what does the system do to the data?
• A DFD is a graphic representation of the flow of data or information
through a system
Decomposition & Abstraction
• external entity - people or organisations that send data into the system or
receive data from the system
• process - models what happens to the data i.e. transforms incoming data
into outgoing data
• data store - represents permanent data that is used by the system
• data flow - models the actual flow of the data between the other elements
Outside Entity
• Data Flow
• Process
• External Entity
• Data Store
Level 0 – Context level
• models system as one process box which represents scope of the system
• identifies external entities and related inputs and outputs
• Additional notation - system box
• Process label - short description of what the process does, e.g. Price order
• Data flow label - noun representing the data flowing through it e.g.
Customer payment
• Data store label - describes the type of data stored
• Make labels as meaningful as possible
Balancing & Data store
• Balancing
– any data flows entering or leaving a parent level must by equivalent to
those on the child level
• Data stores
– data stores that are local to a process need not be included until the
process is expanded
Conventions
• Balancing
• Process at lower level should have identical data flows if they flow out of a
process
• Modelling Data Stores
• Only use DATA STORES used within this process on the diagram
• Numbering
• 1 - 1.1 - 1.1.1
• 1.2 - 1.2.1
• Labels
• Should carry as much meaning as possible
Identifying operations
• The SafeHome security function enables the homeowner to configure the security system
when it is installed, monitors all sensors connected to the security system, and interacts with
the homeowner through the Internet, a PC, or a control panel.
• During installation, the SafeHome PC is used to program and configure the system. Each
sensor is assigned a number and type, a master password is programmed for arming and
disarming the system, and telephone number(s) are input for dialing when a sensor event
occurs.
• When a sensor event is recognized, the software invokes an audible alarm attached to the
system. After a delay time that is specified by the homeowner during system configuration
activities, the software dials a telephone number of a monitoring service, provides information
about the location, reporting the nature of the event that has been detected. The telephone
number will be redialed every 20 seconds until a telephone connection is obtained.
• The homeowner receives security information via a control panel, the PC, or a browser,
collectively called an interface. The interface displays prompting messages and system status
information on the control panel, the PC, or the browser window. Homeowner interaction
takes the following form…
Context Diagram