1. The document describes a use case diagram modeling technique for representing actors, use cases and their relationships in a system.
2. It explains that a use case diagram visually depicts use cases as ellipses and actors as stick figures that interact with the use cases.
3. Common relationships shown include generalization, inclusion and association between use cases and actors.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
52 views15 pages
Use Case Diagram: Behavioral Modeling
1. The document describes a use case diagram modeling technique for representing actors, use cases and their relationships in a system.
2. It explains that a use case diagram visually depicts use cases as ellipses and actors as stick figures that interact with the use cases.
3. Common relationships shown include generalization, inclusion and association between use cases and actors.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15
Behavioral Modeling:
Use Case Diagram
Use Cases and Actors: 1. Use Cases: A use case is a description of a set of sequences of actions, including variants, that a system performs to yield an observable result of value to an actor. Graphically, a use case is rendered as an ellipse. • Actor: An actor represents a coherent set of roles that users of use cases play when interacting with these use cases. • Typically, an actor represents a role that a human, a hardware device, or even another system plays with a system. Use Cases and Flow of Events • A use case describes what a system (or a subsystem, class, or interface) does but it does not specify how it does it. • You can specify the behavior of a use case by describing a flow of events in text clearly enough for an outsider to understand it easily. When you write this flow of events, you should include how and when the use case starts and ends, when the use case interacts with the actors and what objects are exchanged, and the basic flow and alternative flows of the behavior. • you might describe the use case ValidateUser in the following way: • Main flow of events: • Exceptional flow of events: • Exceptional flow of events: • Exceptional flow of events: Use Cases and Collaborations • you can explicitly specify the realization of a use case by a collaboration Organizing Use Cases • You can organize use cases by grouping them in packages in the same manner in which you can organize classes. • You can also organize use cases by specifying generalization, include, and extend relationships among them. • An include relationship between use cases means that the base use case explicitly incorporates the behavior of another use case at a location specified in the base. • An extend relationship between use cases means that the base use case implicitly incorporates the behavior of another use case at a location specified indirectly by the extending use case. Use Case Diagrams • Use case diagrams are one of the five diagrams in the UML for modeling the dynamic aspects of systems Each one shows a set of use cases and actors and their relationships. • Terms and Concepts: A use case diagram is a diagram that shows a set of use cases and actors and their relationships. • Common Properties: A use case diagram is just a special kind of diagram and shares the same common properties as do all other diagrams, a name and graphical contents that are a projection into a model. • Contents: Use case diagrams commonly contain · Use cases · Actors · Dependency, generalization, and association relationships Common Modeling Techniques • i) Modeling the Context of a System ii) Modeling the Requirements of a System • Problem Statement : • Assign the task to develop a new student registration system. The college would like a new client-server system to replace its much older system developed around mainframe technology. The new system will allow students to register for courses and view report cards from personal computers attached to the campus LAN as well as over the Internet. Professors will be able to access the system to sign up to teach courses as well as record grades. • Due to a decrease in federal funding, the college cannot afford to replace the entire system at once. The college will keep the existing course catalog database where all course information is maintained. The legacy system performance is rather poor, so the new system must ensure that access to the data on the legacy system occurs in a timely manner. The new system will access course information from the legacy database but will not update it. The registrar’s office will continue to maintain course information through another system. • At the beginning of each semester, students may request a course catalogue containing a list of course offerings for the semester. Information about each course, such as professor, department, and prerequisites, will be included to help students make informed decisions. • The new system will allow students to select four course offerings for the coming semester. In addition, each student will indicate two alternative choices in case the student cannot be assigned to a primary selection. Course offerings will have a maximum of ten students and a minimum of three students. A course offering with fewer than three students will be cancelled. For each semester, there is a period of time that students can change their schedule. Students must be able to access the system during this time to add or drop courses. Once the registration process is completed for a student, the registration system sends information to the billing system so the student can be billed for the semester. If a course fills up during the actual registration process, the student must be notified of the change before submitting the schedule for processing. • At the end of the semester, the student will be able to access the system to view an electronic report card. Since student grades are sensitive information, the system must employ extra security measures to prevent unauthorized access. • Professors must be able to access the on-line system to indicate which courses they will be teaching. They will also need to see which students signed up for their course offerings. In addition, the professors will be able to record the grades for the students in each class.