SlideShare a Scribd company logo
1 of 25
CHAPTER 5
System modelling
System modelling
• System modelling helps the analyst to understand the
functionality of the system and models are used to
communicate with customers.
• System models are abstract descriptions of systems whose
requirements are being analysed
• Models are created to visually represent the proposed
database so that business requirements can easily be
associated with database objects to ensure that all
requirements can easily be associated with database objects
to ensure that all requirements have been completely and
accurately gathered.
Cont….
• Different types of diagrams are typically
produced to illustrate the business processes,
rules, entities, and organizational units that
have been identified.
• These diagrams often include entity
relationship diagrams and process flow
diagrams
Cont….
• An entity relationship diagram (ERD)
represents the entities, or groups of
information, and their relationships
maintained for a business.
• Process flow diagrams represent business
processes and the flow of data between
different processes and entities that have
been defined.
Cont….
• Basically, data modeling serves as a link
between business needs and system
requirements.
• Two types of data modeling are as follows:
i. Logical modeling
ii. Physical modeling
Logical modeling
• Logical modeling involves gathering
information about business processes,
business entities (categories of data), and
organizational units.
• After this information is gathered, diagrams
and reports are produced including entity
relationship diagrams, business process
diagrams, and eventually process flow
diagrams.
Cont….
• The diagrams produced should show the
processes and data that exists, as well as the
relationships between business processes and
data.
• The diagrams and documentation generated
during logical modeling is used to determine
whether the requirements of the business
have been completely gathered.
Cont….
• Typical deliverables of logical modeling
include:
• Entity relationship diagrams – An Entity
Relationship Diagram provide a picture of the
different categories of data for the business,
as well as how these categories of data are
related to one another.
Cont….
• Business process diagrams – The process
model illustrates all the parent and child
processes that are performed by individuals
within a company.
• The process model gives the development
team an idea of how data moves within the
organization.
• The process model can be used to determine
how a database application interface is design.
Physical Modeling
• Physical modeling involves the actual design of a
database according to the requirements that
were established during logical modeling.
• During physical modeling, objects such as tables
and columns are created based on entities and
attributes that were defined during logical
modeling.
• Physical modeling is when all the pieces come
together to complete the process of defining a
database for a business.
Cont….
• Typical deliverables of physical modeling
include the following:
• User feedback documentation
• Database design documentation
Modelling a system’s processes
• Data Flow Modelling is a widely used and
mature analysis technique, and is
recommended by most structured methods.
• The technique of Data Flow Modelling is used
to progress the analysis of the system’s
processes by providing a more detailed model
of all the system’s data processes.
DFD Notation
• The DFD is a diagram that consists principally
of four symbols, namely the external entity,
the data flow, the process and the data store
Data Flow Diagrams
External Entities
Supplier
Data Flow Diagrams
Data Flows
Cosmetics
Goods
Customer Details
Data Flow (usual)
Bi-directional Flow (rare)
Flow Between External Entities (for
convenience)
Resource Flow (for convenience)
Data Flow Diagrams
Process
Sell
Stock
Cashier3
Data Flow Diagrams
Data Stores
D3 Suppliers
Stock
FileM1
T1 Unpaid Invoices
D1 Orders D1 Orders
Digitised
Manual
Transient
Duplicate
Data Flow Diagrams
Decomposition
Order
Stock
Manager
e
Supplier
d
Purchase Order
Cabinet
M1
Stock
File
M2
*
Receive
Stock
2 Stock Clerk
Manager
e
*
Sell
Stock
3 Cashier
Customer
a
M2
Purchase Order
Stock List
P.O.
Matched Orders
Orders
Purchase Order
Delivery
Bought Goods
Stock List
Sold Goods
Delivered Goods
1 Stock Clerk
Stock
File
• A closer look at process 1 of the Small Stock System
also shows that it is logically consistent and does
indeed describe the activity of ordering stock
• On the other hand, it does not contain enough detail
to understand exactly what happens when stock is
ordered
• The DFD deals with these issues by allowing more
detailed views of the high level processes
• This is done by breaking up each process into as
many sub-processes as deemed necessary
Data Flow Diagrams
Decomposing Data Flow Diagrams
• Any process on a DFD may be broken up into several
sub-processes which, when viewed collectively,
make up that process
• Thus for example we may break-up process 1 of the
Small Stock System into that shown on the next
slide:
Data Flow Diagrams
Decomposing Data Flow Diagrams
1 Order Stock
Purchase Order
Cabinet
M1
Manager
e
Stock
File
M2
*
Produce
Stock
List
1.1
*
Record
Purchase
Order
1.2
Stock List
Purchase Order
Purchase Order
Stock List
Data Flow Diagrams
Decomposing Data Flow Diagrams
• A process that is decomposed is known as a ‘parent’
whose ‘children’ are the diagrams derived from it
• Any process that does not contain any further
decomposition ( i.e. has no children) is known as a
‘bottom level’ or ‘elementary’ process
• These elementary processes constitute the building
blocks of the system and as such need to be
considered carefully
Data Flow Diagrams
Decomposing Data Flow Diagrams
Manager
e
Supplier
d
Customer
a
Bought Goods
Purchase Order
P.O.
Stock List
Small
Stock
System
Delivery
Matched Orders
Data Flow Diagrams
Context Diagrams
• A level higher
than level 1,
showing the
whole system
as a single
process with
external
entities around
it, is also
possible:
Data Flow Diagrams
Starting from the Context Diagram
• To develop a Context Diagram we carry out the
following tasks:
(i) Identify all sources and recipients of data from the
system, i.e. external entities
(ii) Identify the major data flows to and from the external
entities
(iii)Convert each source or recipient into an external entity
symbol
(iv)Add the data flows between each external entity and a
single box representing the entire system
END

More Related Content

What's hot

Modelling System Requirements: Events & Things
Modelling System Requirements: Events & ThingsModelling System Requirements: Events & Things
Modelling System Requirements: Events & Thingswmomoni
 
SE_Lec 08_UML Use Cases
SE_Lec 08_UML Use CasesSE_Lec 08_UML Use Cases
SE_Lec 08_UML Use CasesAmr E. Mohamed
 
R1x g02 enterprise architecture i
R1x g02 enterprise architecture iR1x g02 enterprise architecture i
R1x g02 enterprise architecture icairo university
 
Modeling System Requirements
Modeling System RequirementsModeling System Requirements
Modeling System RequirementsAsjad Raza
 
Introduction to System Analysis and Design - Cybernetics Robo Academy
Introduction to System Analysis and Design - Cybernetics Robo AcademyIntroduction to System Analysis and Design - Cybernetics Robo Academy
Introduction to System Analysis and Design - Cybernetics Robo AcademyTutulAhmed3
 
SE18_Lec 07_System Modelling and Context Model
SE18_Lec 07_System Modelling and Context ModelSE18_Lec 07_System Modelling and Context Model
SE18_Lec 07_System Modelling and Context ModelAmr E. Mohamed
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case DiagramKumar
 
SE18_Lec 08_UML Class Diagram
SE18_Lec 08_UML Class DiagramSE18_Lec 08_UML Class Diagram
SE18_Lec 08_UML Class DiagramAmr E. Mohamed
 
Use case diagrams
Use case diagramsUse case diagrams
Use case diagramsMir Majid
 
Lecture 16 requirements modeling - scenario, information and analysis classes
Lecture 16   requirements modeling - scenario, information and analysis classesLecture 16   requirements modeling - scenario, information and analysis classes
Lecture 16 requirements modeling - scenario, information and analysis classesIIUI
 

What's hot (20)

Module 2 17CS45
Module 2 17CS45Module 2 17CS45
Module 2 17CS45
 
Functional modeling
Functional modelingFunctional modeling
Functional modeling
 
Ch8
Ch8Ch8
Ch8
 
Modelling System Requirements: Events & Things
Modelling System Requirements: Events & ThingsModelling System Requirements: Events & Things
Modelling System Requirements: Events & Things
 
SE_Lec 08_UML Use Cases
SE_Lec 08_UML Use CasesSE_Lec 08_UML Use Cases
SE_Lec 08_UML Use Cases
 
Analysis modeling
Analysis modelingAnalysis modeling
Analysis modeling
 
Modeling software architecture with uml
Modeling software architecture with umlModeling software architecture with uml
Modeling software architecture with uml
 
R1x g02 enterprise architecture i
R1x g02 enterprise architecture iR1x g02 enterprise architecture i
R1x g02 enterprise architecture i
 
Modeling System Requirements
Modeling System RequirementsModeling System Requirements
Modeling System Requirements
 
Introduction to System Analysis and Design - Cybernetics Robo Academy
Introduction to System Analysis and Design - Cybernetics Robo AcademyIntroduction to System Analysis and Design - Cybernetics Robo Academy
Introduction to System Analysis and Design - Cybernetics Robo Academy
 
SE18_Lec 07_System Modelling and Context Model
SE18_Lec 07_System Modelling and Context ModelSE18_Lec 07_System Modelling and Context Model
SE18_Lec 07_System Modelling and Context Model
 
Week 5
Week 5Week 5
Week 5
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case Diagram
 
SE18_Lec 08_UML Class Diagram
SE18_Lec 08_UML Class DiagramSE18_Lec 08_UML Class Diagram
SE18_Lec 08_UML Class Diagram
 
Use case diagrams
Use case diagramsUse case diagrams
Use case diagrams
 
Use case diagrams
Use case diagramsUse case diagrams
Use case diagrams
 
Use case Diagram
Use case DiagramUse case Diagram
Use case Diagram
 
System ana
System anaSystem ana
System ana
 
Lecture 16 requirements modeling - scenario, information and analysis classes
Lecture 16   requirements modeling - scenario, information and analysis classesLecture 16   requirements modeling - scenario, information and analysis classes
Lecture 16 requirements modeling - scenario, information and analysis classes
 
Structure chart
Structure chartStructure chart
Structure chart
 

Viewers also liked

Maintenance: the cost for software vendors and what it means to your organiza...
Maintenance: the cost for software vendors and what it means to your organiza...Maintenance: the cost for software vendors and what it means to your organiza...
Maintenance: the cost for software vendors and what it means to your organiza...nick_hans
 
Legacy Software Maintenance And Management
Legacy Software Maintenance And ManagementLegacy Software Maintenance And Management
Legacy Software Maintenance And ManagementValueCoders
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect ManagementAjay K
 
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
Maintenance,Re-engineering &Reverse Engineering in Software EngineeringMaintenance,Re-engineering &Reverse Engineering in Software Engineering
Maintenance, Re-engineering &Reverse Engineering in Software EngineeringManish Kumar
 
Clean Code - Design Patterns and Best Practices at Silicon Valley Code Camp
Clean Code - Design Patterns and Best Practices at Silicon Valley Code CampClean Code - Design Patterns and Best Practices at Silicon Valley Code Camp
Clean Code - Design Patterns and Best Practices at Silicon Valley Code CampTheo Jungeblut
 
Software reverse engineering
Software reverse engineeringSoftware reverse engineering
Software reverse engineeringParminder Singh
 
Documentation and maintenance of records ppt by zuhaib
Documentation and maintenance of records ppt by zuhaibDocumentation and maintenance of records ppt by zuhaib
Documentation and maintenance of records ppt by zuhaibmohd zuhaib dar
 
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCE
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCEObject Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCE
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCEVipin Kumar
 
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - Process
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - ProcessArchitectural Design 1 Lectures by Dr. Yasser Mahgoub - Process
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - ProcessGalala University
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMSkoolkampus
 
Good documentation practice
Good documentation practiceGood documentation practice
Good documentation practicePharmaceutical
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing BasicsBelal Raslan
 

Viewers also liked (20)

Security chapter6
Security chapter6Security chapter6
Security chapter6
 
Maintenance: the cost for software vendors and what it means to your organiza...
Maintenance: the cost for software vendors and what it means to your organiza...Maintenance: the cost for software vendors and what it means to your organiza...
Maintenance: the cost for software vendors and what it means to your organiza...
 
Sidra Agile Software Process
Sidra Agile Software ProcessSidra Agile Software Process
Sidra Agile Software Process
 
Legacy Software Maintenance And Management
Legacy Software Maintenance And ManagementLegacy Software Maintenance And Management
Legacy Software Maintenance And Management
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect Management
 
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
Maintenance,Re-engineering &Reverse Engineering in Software EngineeringMaintenance,Re-engineering &Reverse Engineering in Software Engineering
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
 
Clean Code - Design Patterns and Best Practices at Silicon Valley Code Camp
Clean Code - Design Patterns and Best Practices at Silicon Valley Code CampClean Code - Design Patterns and Best Practices at Silicon Valley Code Camp
Clean Code - Design Patterns and Best Practices at Silicon Valley Code Camp
 
Slides chapter 9
Slides chapter 9Slides chapter 9
Slides chapter 9
 
Software reverse engineering
Software reverse engineeringSoftware reverse engineering
Software reverse engineering
 
Slides chapter 8
Slides chapter 8Slides chapter 8
Slides chapter 8
 
Documentation and maintenance of records ppt by zuhaib
Documentation and maintenance of records ppt by zuhaibDocumentation and maintenance of records ppt by zuhaib
Documentation and maintenance of records ppt by zuhaib
 
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCE
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCEObject Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCE
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCE
 
software engineering
 software engineering software engineering
software engineering
 
Sw Software Design
Sw Software DesignSw Software Design
Sw Software Design
 
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - Process
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - ProcessArchitectural Design 1 Lectures by Dr. Yasser Mahgoub - Process
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - Process
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS
 
Good documentation practice
Good documentation practiceGood documentation practice
Good documentation practice
 
Html Ppt
Html PptHtml Ppt
Html Ppt
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing Basics
 
An introduction to software engineering
An introduction to software engineeringAn introduction to software engineering
An introduction to software engineering
 

Similar to SYSTEM MODELLING

Hi600 u05_inst_slides
Hi600 u05_inst_slidesHi600 u05_inst_slides
Hi600 u05_inst_slidesljmcneill33
 
AIS PPt.pptx
AIS PPt.pptxAIS PPt.pptx
AIS PPt.pptxdereje33
 
Structured system analysis
Structured system analysisStructured system analysis
Structured system analysislearnt
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADMFLYMAN TECHNOLOGY LIMITED
 
6.SE_Requirements Modeling.ppt
6.SE_Requirements Modeling.ppt6.SE_Requirements Modeling.ppt
6.SE_Requirements Modeling.pptHaiderAli252366
 
Df dtutorial
Df dtutorialDf dtutorial
Df dtutorialAlex Ali
 
Data flow diagram
Data flow diagramData flow diagram
Data flow diagramFizza Khan
 
chapter05-120827115357-phpapp01.pdf
chapter05-120827115357-phpapp01.pdfchapter05-120827115357-phpapp01.pdf
chapter05-120827115357-phpapp01.pdfAxmedMaxamuud6
 
Chapter 5 Data and Process Modeling .pptx
Chapter 5 Data and Process Modeling .pptxChapter 5 Data and Process Modeling .pptx
Chapter 5 Data and Process Modeling .pptxAxmedMaxamuudYoonis
 
An Introduction To Software Development - Architecture & Detailed Design
An Introduction To Software Development - Architecture & Detailed DesignAn Introduction To Software Development - Architecture & Detailed Design
An Introduction To Software Development - Architecture & Detailed DesignBlue Elephant Consulting
 
DFDs_and_Algorithms.pptx
DFDs_and_Algorithms.pptxDFDs_and_Algorithms.pptx
DFDs_and_Algorithms.pptxAliyahAli19
 
IPT HSC 1.5) Designing Solutions
IPT HSC 1.5) Designing SolutionsIPT HSC 1.5) Designing Solutions
IPT HSC 1.5) Designing Solutionsctedds
 
Analyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow DiagramsAnalyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow DiagramsChristina Valadez
 
SE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdfSE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdfRAVALCHIRAG1
 
System engineering analysis and design
System engineering analysis and designSystem engineering analysis and design
System engineering analysis and designDr. Vardhan choubey
 
chapter5-220725172250-dc425eb2.pdf
chapter5-220725172250-dc425eb2.pdfchapter5-220725172250-dc425eb2.pdf
chapter5-220725172250-dc425eb2.pdfMahmoudSOLIMAN380726
 

Similar to SYSTEM MODELLING (20)

Hi600 u05_inst_slides
Hi600 u05_inst_slidesHi600 u05_inst_slides
Hi600 u05_inst_slides
 
System design
System designSystem design
System design
 
AIS PPt.pptx
AIS PPt.pptxAIS PPt.pptx
AIS PPt.pptx
 
Structured system analysis
Structured system analysisStructured system analysis
Structured system analysis
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADM
 
6.SE_Requirements Modeling.ppt
6.SE_Requirements Modeling.ppt6.SE_Requirements Modeling.ppt
6.SE_Requirements Modeling.ppt
 
Lec01.pptx
Lec01.pptxLec01.pptx
Lec01.pptx
 
Df dtutorial
Df dtutorialDf dtutorial
Df dtutorial
 
Df dtutorial
Df dtutorialDf dtutorial
Df dtutorial
 
Data flow diagram
Data flow diagramData flow diagram
Data flow diagram
 
chapter05-120827115357-phpapp01.pdf
chapter05-120827115357-phpapp01.pdfchapter05-120827115357-phpapp01.pdf
chapter05-120827115357-phpapp01.pdf
 
Df dtutorial
Df dtutorialDf dtutorial
Df dtutorial
 
Chapter 5 Data and Process Modeling .pptx
Chapter 5 Data and Process Modeling .pptxChapter 5 Data and Process Modeling .pptx
Chapter 5 Data and Process Modeling .pptx
 
An Introduction To Software Development - Architecture & Detailed Design
An Introduction To Software Development - Architecture & Detailed DesignAn Introduction To Software Development - Architecture & Detailed Design
An Introduction To Software Development - Architecture & Detailed Design
 
DFDs_and_Algorithms.pptx
DFDs_and_Algorithms.pptxDFDs_and_Algorithms.pptx
DFDs_and_Algorithms.pptx
 
IPT HSC 1.5) Designing Solutions
IPT HSC 1.5) Designing SolutionsIPT HSC 1.5) Designing Solutions
IPT HSC 1.5) Designing Solutions
 
Analyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow DiagramsAnalyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow Diagrams
 
SE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdfSE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdf
 
System engineering analysis and design
System engineering analysis and designSystem engineering analysis and design
System engineering analysis and design
 
chapter5-220725172250-dc425eb2.pdf
chapter5-220725172250-dc425eb2.pdfchapter5-220725172250-dc425eb2.pdf
chapter5-220725172250-dc425eb2.pdf
 

More from FLYMAN TECHNOLOGY LIMITED

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFLYMAN TECHNOLOGY LIMITED
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)FLYMAN TECHNOLOGY LIMITED
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5FLYMAN TECHNOLOGY LIMITED
 

More from FLYMAN TECHNOLOGY LIMITED (20)

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction Presentation
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)
 
Flyman Technology Limited Tanzania
Flyman Technology Limited TanzaniaFlyman Technology Limited Tanzania
Flyman Technology Limited Tanzania
 
Saadani national park 2015
Saadani national park 2015Saadani national park 2015
Saadani national park 2015
 
Uuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asiliUuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asili
 
Entrepreneurship manual BIT
Entrepreneurship manual BITEntrepreneurship manual BIT
Entrepreneurship manual BIT
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5
 
Dhtml chapter2
Dhtml chapter2Dhtml chapter2
Dhtml chapter2
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
introduction to web application development
introduction to web application developmentintroduction to web application development
introduction to web application development
 
Marketing management
Marketing managementMarketing management
Marketing management
 
Marketing communications
Marketing communicationsMarketing communications
Marketing communications
 
Marketing analysis
Marketing analysisMarketing analysis
Marketing analysis
 
Market segmentation
Market segmentationMarket segmentation
Market segmentation
 
Consumer markets
Consumer marketsConsumer markets
Consumer markets
 
ENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUALENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUAL
 
THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!
 
TAXATION CONCEPTS
TAXATION CONCEPTSTAXATION CONCEPTS
TAXATION CONCEPTS
 
Html tutorial
Html tutorialHtml tutorial
Html tutorial
 
computer network 2
computer network 2computer network 2
computer network 2
 

Recently uploaded

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

SYSTEM MODELLING

  • 2. System modelling • System modelling helps the analyst to understand the functionality of the system and models are used to communicate with customers. • System models are abstract descriptions of systems whose requirements are being analysed • Models are created to visually represent the proposed database so that business requirements can easily be associated with database objects to ensure that all requirements can easily be associated with database objects to ensure that all requirements have been completely and accurately gathered.
  • 3. Cont…. • Different types of diagrams are typically produced to illustrate the business processes, rules, entities, and organizational units that have been identified. • These diagrams often include entity relationship diagrams and process flow diagrams
  • 4. Cont…. • An entity relationship diagram (ERD) represents the entities, or groups of information, and their relationships maintained for a business. • Process flow diagrams represent business processes and the flow of data between different processes and entities that have been defined.
  • 5. Cont…. • Basically, data modeling serves as a link between business needs and system requirements. • Two types of data modeling are as follows: i. Logical modeling ii. Physical modeling
  • 6. Logical modeling • Logical modeling involves gathering information about business processes, business entities (categories of data), and organizational units. • After this information is gathered, diagrams and reports are produced including entity relationship diagrams, business process diagrams, and eventually process flow diagrams.
  • 7. Cont…. • The diagrams produced should show the processes and data that exists, as well as the relationships between business processes and data. • The diagrams and documentation generated during logical modeling is used to determine whether the requirements of the business have been completely gathered.
  • 8. Cont…. • Typical deliverables of logical modeling include: • Entity relationship diagrams – An Entity Relationship Diagram provide a picture of the different categories of data for the business, as well as how these categories of data are related to one another.
  • 9. Cont…. • Business process diagrams – The process model illustrates all the parent and child processes that are performed by individuals within a company. • The process model gives the development team an idea of how data moves within the organization. • The process model can be used to determine how a database application interface is design.
  • 10. Physical Modeling • Physical modeling involves the actual design of a database according to the requirements that were established during logical modeling. • During physical modeling, objects such as tables and columns are created based on entities and attributes that were defined during logical modeling. • Physical modeling is when all the pieces come together to complete the process of defining a database for a business.
  • 11. Cont…. • Typical deliverables of physical modeling include the following: • User feedback documentation • Database design documentation
  • 12. Modelling a system’s processes • Data Flow Modelling is a widely used and mature analysis technique, and is recommended by most structured methods. • The technique of Data Flow Modelling is used to progress the analysis of the system’s processes by providing a more detailed model of all the system’s data processes.
  • 13. DFD Notation • The DFD is a diagram that consists principally of four symbols, namely the external entity, the data flow, the process and the data store
  • 14. Data Flow Diagrams External Entities Supplier
  • 15. Data Flow Diagrams Data Flows Cosmetics Goods Customer Details Data Flow (usual) Bi-directional Flow (rare) Flow Between External Entities (for convenience) Resource Flow (for convenience)
  • 17. Data Flow Diagrams Data Stores D3 Suppliers Stock FileM1 T1 Unpaid Invoices D1 Orders D1 Orders Digitised Manual Transient Duplicate
  • 18. Data Flow Diagrams Decomposition Order Stock Manager e Supplier d Purchase Order Cabinet M1 Stock File M2 * Receive Stock 2 Stock Clerk Manager e * Sell Stock 3 Cashier Customer a M2 Purchase Order Stock List P.O. Matched Orders Orders Purchase Order Delivery Bought Goods Stock List Sold Goods Delivered Goods 1 Stock Clerk Stock File
  • 19. • A closer look at process 1 of the Small Stock System also shows that it is logically consistent and does indeed describe the activity of ordering stock • On the other hand, it does not contain enough detail to understand exactly what happens when stock is ordered • The DFD deals with these issues by allowing more detailed views of the high level processes • This is done by breaking up each process into as many sub-processes as deemed necessary Data Flow Diagrams Decomposing Data Flow Diagrams
  • 20. • Any process on a DFD may be broken up into several sub-processes which, when viewed collectively, make up that process • Thus for example we may break-up process 1 of the Small Stock System into that shown on the next slide: Data Flow Diagrams Decomposing Data Flow Diagrams
  • 21. 1 Order Stock Purchase Order Cabinet M1 Manager e Stock File M2 * Produce Stock List 1.1 * Record Purchase Order 1.2 Stock List Purchase Order Purchase Order Stock List Data Flow Diagrams Decomposing Data Flow Diagrams
  • 22. • A process that is decomposed is known as a ‘parent’ whose ‘children’ are the diagrams derived from it • Any process that does not contain any further decomposition ( i.e. has no children) is known as a ‘bottom level’ or ‘elementary’ process • These elementary processes constitute the building blocks of the system and as such need to be considered carefully Data Flow Diagrams Decomposing Data Flow Diagrams
  • 23. Manager e Supplier d Customer a Bought Goods Purchase Order P.O. Stock List Small Stock System Delivery Matched Orders Data Flow Diagrams Context Diagrams • A level higher than level 1, showing the whole system as a single process with external entities around it, is also possible:
  • 24. Data Flow Diagrams Starting from the Context Diagram • To develop a Context Diagram we carry out the following tasks: (i) Identify all sources and recipients of data from the system, i.e. external entities (ii) Identify the major data flows to and from the external entities (iii)Convert each source or recipient into an external entity symbol (iv)Add the data flows between each external entity and a single box representing the entire system
  • 25. END