0% found this document useful (0 votes)
1 views35 pages

435_Chapter6

Lecture 6 focuses on requirements modeling in software engineering, detailing the processes of requirements analysis, domain analysis, and scenario-based modeling. It emphasizes the importance of use cases, class-based modeling, and CRC models for identifying and organizing classes relevant to system requirements. The lecture also discusses the relationships between classes, dependencies, and the organization of analysis packages.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views35 pages

435_Chapter6

Lecture 6 focuses on requirements modeling in software engineering, detailing the processes of requirements analysis, domain analysis, and scenario-based modeling. It emphasizes the importance of use cases, class-based modeling, and CRC models for identifying and organizing classes relevant to system requirements. The lecture also discusses the relationships between classes, dependencies, and the organization of analysis packages.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 35

Lecture 6: Chapter 6

 Requirements Modeling: Scenarios, Information,


and Analysis Classes
Slide Set to accompany
Software Engineering: A Practitioner’s Approach, 7/e
by Roger S. Pressman

Slides copyright © 1996, 2001, 2005, 2009 by Roger S. Pressman

For non-profit educational use only


May be reproduced ONLY for student use at the university level when used in conjunction
with Software Engineering: A Practitioner's Approach, 7/e. Any other reproduction or use is
prohibited without the express written permission of the author.

All copyright information MUST appear if these slides are posted on a website for student
use.

1
Requirements Analysis
 Requirements analysis
 specifies software’s operational characteristics
 indicates software's interface with other system elements
 establishes constraints that software must meet
 Requirements analysis allows the software engineer
(called an analyst or modeler) to:
 elaborate on basic requirements established during earlier
requirement engineering tasks
 build models that depict user scenarios, functional
activities, problem classes and their relationships, system
and class behavior, and the flow of data as it is
transformed.

2
A Bridge

system
description

analysis
model

design
model

3
Domain Analysis
 As part of Requirement Analysis, this is done for
software reuse:
 Can I use these designs for similar applications in the
same domain?
 Define the domain to be investigated.
 Collect a representative sample of applications in the
domain.
 Analyze each application in the sample.
 Develop an analysis model for the objects.

4
Elements of Requirements Analysis:
Different Viewpoints

5
Scenario-Based Modeling
“[Use-cases] are simply an aid to defining what exists
outside the system (actors) and what should be
performed by the system (use-cases).” Ivar Jacobson
(1) What should we write about?
(2) How much should we write about it?
(3) How detailed should we make our description?
(4) How should we organize the description?

6
What to Write About?
 Inception and elicitation—provide you with
the information you’ll need to begin writing
use cases.
 Requirements gathering meetings and other
requirements engineering mechanisms are
used
 To begin developing a set of use cases, list
the functions or activities performed by a
specific actor.

7
How Much to Write About?
 As further conversations with the stakeholders
progress, the requirements gathering team
develops use cases for each of the functions
noted.
 In general, use cases are written first in an
informal narrative fashion.
 If more formality is required, the same use
case is rewritten using a structured format
similar to the one proposed (template page
160).

8
Use Case Descriptions –
High Level Descriptions

Use case: Issue bike


Actors: Receptionist
Goal: To hire out a bike

Description:
When a customer comes into the shop they choose a bike
to hire. The Receptionist looks up the bike on the system
and tells the customer how much it will cost to hire for a
specified period. The customer pays, is issued with a
receipt, then leaves with the bike.
Use case : Issue bike
Actors: Receptionist
Goal: To hire out a bike
Overview:
When a customer comes into the shop they choose a bike to hire. The receptionist
looks up the bike on the system and tells the customer how much it will cost to hire
the bike for a specified period. The customer pays, is issued with a receipt, then
leaves with the bike.
Cross reference R3, R4, R5, R6, R7, R8, R9, R10
Typical course of events
Actor action System response

1. The customer chooses a bike


2.The Receptionist keys in the bike number 3. Displays the bike details
4. Customer specifies length of hire
5. Receptionist keys this in 6. Displays total hire cost
7. Customer agrees the price
8. Receptionist keys in the customer details 9. Displays customer details
10. Customer pays the total cost
11. Receptionist records amount paid 12. Prints a receipt

Alternative courses
Steps 8 and 9. The customer details are already in the system so the Receptionist
needs only to key in an identifier and the system will display the customer details.
Steps 7 – 12. The customer may not be happy with the price and may terminate the
transaction.
Developing a Use-Case
 What are the main tasks or functions that are performed by
the actor?
 What system information will the the actor acquire,
produce or change?
 Will the actor have to inform the system about changes in
the external environment?
 What information does the actor desire from the system?
 Does the actor wish to be informed about unexpected
changes?

11
Preliminary Use-Case
Diagrams for SafeHome
SafeHome

Access camera
surveillance via the cameras
Internet

Configure SafeHome
system parameters

homeowner

Set alarm

12
Activity Diagram of First Use
Case using UML
Supplements the enter password
and user ID

use case by
providing a valid passwords/ ID invalid passwords/ ID

graphical select major function prompt for reentry

representation of
other f unctions
may also be
selected
input tries remain

the flow of
select surveillance
no input
tries remain

interaction thumbnail views select a specif ic camera

within a specific select specific


select camera icon

scenario
camera - thumbnails

view camera output


in labelled window

prompt for
another view

exit this f unction


see another camera

13
Class-Based Modeling
 Class-based modeling represents:
 objects that the system will manipulate
 operations (also called methods or services) that
will be applied to the objects to effect the
manipulation
 relationships (some hierarchical) between the
objects
 collaborations that occur between the classes that
are defined.
 The elements of a class-based model include
classes and objects, attributes, operations,
CRC models, collaboration diagrams and
packages.
14
Identifying Analysis Classes
 Examining the usage scenarios developed
as part of the requirements model and
perform a "grammatical parse" [Abb83]
 Classes are determined by underlining each
noun or noun phrase and entering it into a
simple table.
 Synonyms should be noted.
 If the class (noun) is required to implement a
solution, then it is part of the solution space;
otherwise, if a class is necessary only to
describe a solution, it is part of the problem
space.
 But what should we look for once all of
the nouns have been isolated?
15
Manifestations of Analysis Classes
 Analysis classes manifest themselves in one of the following ways:
 External entities (e.g., other systems, devices, people) that
produce or consume information
 Things (e.g, reports, displays, letters, signals) that are part of
the information domain for the problem
 Occurrences or events (e.g., a property transfer or the
completion of a series of robot movements) that occur within
the context of system operation
 Roles (e.g., manager, engineer, salesperson) played by people
who interact with the system
 Organizational units (e.g., division, group, team) that are
relevant to an application
 Places (e.g., manufacturing floor or loading dock) that establish
the context of the problem and the overall function
 Structures (e.g., sensors, four-wheeled vehicles, or computers)
that define a class of objects or related classes of objects

16
Potential Classes (to be
included in Analysis Model)
 Retained information. The potential class will be useful during
analysis only if information about it must be remembered so that
the system can function.
 Needed services. The potential class must have a set of identifiable
operations that can change the value of its attributes in some way.
 Multiple attributes. During requirement analysis, the focus should
be on "major" information; a class with a single attribute may, in
fact, be useful during design, but is probably better represented as
an attribute of another class during the analysis activity.
 Common attributes. A set of attributes can be defined for the
potential class and these attributes apply to all instances of the
class.
 Common operations. A set of operations can be defined for the
potential class and these operations apply to all instances of the
class.
 Essential requirements. External entities that appear in the
problem space and produce or consume information essential to
the operation of any solution for the system will almost always be
defined as classes in the requirements model.

17
Defining Attributes
 Attributes describe a class that has been
selected for inclusion in the analysis
model.
 build two different classes for professional
baseball players
• For Playing Statistics software: name,
position, batting average, fielding percentage, years
played, and games played might be relevant
• For Pension Fund software: average salary,
credit toward full vesting, pension plan options chosen,
mailing address, and the like.

18
Defining Operations
 Do a grammatical parse of a processing
narrative and look at the verbs
 Operations can be divided into four
broad categories:
 (1) operations that manipulate data in some
way (e.g., adding, deleting, reformatting,
selecting)
 (2) operations that perform a computation
 (3) operations that inquire about the state of
an object, and
 (4) operations that monitor an object for the
occurrence of a controlling event.
19
CRC Models
 Class-responsibility-collaborator (CRC)
modeling [Wir90] provides a simple means
for identifying and organizing the classes
that are relevant to system or product
requirements. Ambler [Amb95] describes
CRC modeling in the following way:
 A CRC model is really a collection of standard
index cards that represent classes. The cards
are divided into three sections. Along the top of
the card you write the name of the class. In the
body of the card you list the class
responsibilities on the left and the collaborators
on the right.

20
CRC Modeling
Class:
Class:
Description:
Class:
Description:
Class:FloorPlan
Description:
Responsibility:
Description: Collaborator:
Responsibility: Collaborator:
Responsibility: Collaborator:
Responsibility: Collaborator:
defines floor plan name/type
manages floor plan positioning
scales floor plan for display
scales floor plan for display
incorporates walls, doors and windows Wall
shows position of video cameras Camera

21
Class Types in CRC
 Entity classes, also called model or business classes, are
extracted directly from the statement of the problem (e.g.,
FloorPlan and Sensor).
 Boundary classes are used to create the interface (e.g.,
interactive screen or printed reports) that the user sees and
interacts with as the software is used.
 Controller classes manage a “unit of work” [UML03] from start to
finish. That is, controller classes can be designed to manage
 the creation or update of entity objects;
 the instantiation of boundary objects as they obtain information from
entity objects;
 complex communication between sets of objects;
 validation of data communicated between objects or between the
user and the application.

22
Responsibilities
 System intelligence should be distributed across classes
to best address the needs of the problem
 Each responsibility should be stated as generally as
possible
 Information and the behavior related to it should reside
within the same class
 Information about one thing should be localized with a
single class, not distributed across multiple classes.
 Responsibilities should be shared among related
classes, when appropriate.

23
Collaborations
 Classes fulfill their responsibilities in one of two ways:
 A class can use its own operations to manipulate its own
attributes, thereby fulfilling a particular responsibility, or
 a class can collaborate with other classes.
 Collaborations identify relationships between classes
 Collaborations are identified by determining whether a class
can fulfill each responsibility itself
 three different generic relationships between classes [WIR90]:
 the is-part-of relationship
 the has-knowledge-of relationship
 the depends-upon relationship

24
Composite Aggregate Class
(is-part-of Example in UML)
Player

PlayerHead PlayerBody PlayerArms PlayerLegs

25
Associations and Dependencies
 Two analysis classes are often related to one
another in some fashion
 In UML these relationships are called associations
 Associations can be refined by indicating multiplicity
(the term cardinality is used in data modeling
 In many instances, a client-server relationship
exists between two analysis classes.
 In such cases, a client-class depends on the server-
class in some way and a dependency relationship is
established

26
Multiplicity
Wall

1 1 1

is used to build is used to build

1..* 0..* is used to build 0..*

WallSegment Window Door

27
Dependencies

DisplayWindow Camera

<<access>>

{password}

28
Analysis Packages
 Various elements of the analysis model (e.g., use-cases,
analysis classes) are categorized in a manner that
packages them as a grouping
 The plus sign preceding the analysis class name in each
package indicates that the classes have public visibility
and are therefore accessible from other packages.
 Other symbols can precede an element within a
package. A minus sign indicates that an element is
hidden from all other packages and a # symbol indicates
that an element is accessible only to packages
contained within a given package.
 See the example on video game in the next slide

29
Analysis Packages
package name

Environment
+Tree
+Landscape
+Road
+Wall
+Bridge
+Building RulesOfTheGame
+VisualEffect
+Scene +RulesOfMovement
+ConstraintsOnAction

Characters

+Player
+Protagonist
+Antagonist
+SupportingRole

30
Reviewing the CRC Model
 All participants in the review (of the CRC model) are given a subset of the CRC
model index cards.
 Cards that collaborate should be separated (i.e., no reviewer should have two cards
that collaborate).
 All use-case scenarios (and corresponding use-case diagrams) should be
organized into categories.
 The review leader reads the use-case deliberately.
 As the review leader comes to a named object, she passes a token to the person
holding the corresponding class index card.
 When the token is passed, the holder of the class card is asked to describe the
responsibilities noted on the card.
 The group determines whether one (or more) of the responsibilities satisfies the use-
case requirement.
 If the responsibilities and collaborations noted on the index cards cannot
accommodate the use-case, modifications are made to the cards.
 This may include the definition of new classes (and corresponding CRC index cards)
or the specification of new or revised responsibilities or collaborations on existing
cards.

31
Data Modeling
 examines data objects independently of
processing
 focuses attention on the data domain
 creates a model at the customer’s level
of abstraction
 indicates how data objects relate to one
another

32
What is a Data Object?
 a representation of almost any composite
information that must be understood by software.
 composite information—something that has a number
of different properties or attributes
 can be an external entity (e.g., anything that
produces or consumes information), a thing (e.g., a
report or a display), an occurrence (e.g., a
telephone call) or event (e.g., an alarm), a role (e.g.,
salesperson), an organizational unit (e.g.,
accounting department), a place (e.g., a
warehouse), or a structure (e.g., a file).
 The description of the data object incorporates the
data object and all of its attributes.
 A data object encapsulates data only—there is no
reference within a data object to operations that act
on the data.

33
Data Objects and Attributes
A data object contains a set of
attributes that act as an aspect,
quality, characteristic, or descriptor of
the object
object: automobile
attributes:
make
model
body type
price
options code

34
What is a Relationship?
 Data objects are connected to one another in
different ways.
 A connection is established between person and car
because the two objects are related.
• A person owns a car
• A person is insured to drive a car
 The relationships owns and insured to drive
define the relevant connections between
person and car.
 Several instances of a relationship can exist
 Objects can be related in many different ways

35

You might also like