SlideShare a Scribd company logo
1 of 61
Chapter 9 – Software Evolution
Chapter 9 Software Evolution 1
30/10/2014
Topics covered
ī‚˛ Evolution processes
ī‚˛ Legacy systems
ī‚˛ Software maintenance
Chapter 9 Software Evolution 2
30/10/2014
Software change
ī‚˛ Software change is inevitable
ī‚§ New requirements emerge when the software is used;
ī‚§ The business environment changes;
ī‚§ Errors must be repaired;
ī‚§ New computers and equipment is added to the system;
ī‚§ The performance or reliability of the system may have to be
improved.
ī‚˛ A key problem for all organizations is implementing and
managing change to their existing software systems.
Chapter 9 Software Evolution 3
30/10/2014
Importance of evolution
ī‚˛ Organisations have huge investments in their software
systems - they are critical business assets.
ī‚˛ To maintain the value of these assets to the business,
they must be changed and updated.
ī‚˛ The majority of the software budget in large companies
is devoted to changing and evolving existing software
rather than developing new software.
Chapter 9 Software Evolution 4
30/10/2014
A spiral model of development and evolution
Chapter 9 Software Evolution 5
30/10/2014
Evolution and servicing
Chapter 9 Software Evolution 6
30/10/2014
Evolution and servicing
ī‚˛ Evolution
ī‚§ The stage in a software system’s life cycle where it is in
operational use and is evolving as new requirements are
proposed and implemented in the system.
ī‚˛ Servicing
ī‚§ At this stage, the software remains useful but the only changes
made are those required to keep it operational i.e. bug fixes and
changes to reflect changes in the software’s environment. No
new functionality is added.
ī‚˛ Phase-out
ī‚§ The software may still be used but no further changes are made
to it.
Chapter 9 Software Evolution 7
30/10/2014
Evolution processes
Chapter 9 Software Evolution 8
30/10/2014
Evolution processes
ī‚˛ Software evolution processes depend on
ī‚§ The type of software being maintained;
ī‚§ The development processes used;
ī‚§ The skills and experience of the people involved.
ī‚˛ Proposals for change are the driver for system evolution.
ī‚§ Should be linked with components that are affected by the
change, thus allowing the cost and impact of the change to be
estimated.
ī‚˛ Change identification and evolution continues throughout
the system lifetime.
Chapter 9 Software Evolution 9
30/10/2014
Change identification and evolution processes
Chapter 9 Software Evolution 10
30/10/2014
The software evolution process
Chapter 9 Software Evolution 11
30/10/2014
Change implementation
Chapter 9 Software Evolution 12
30/10/2014
Change implementation
ī‚˛ Iteration of the development process where the revisions
to the system are designed, implemented and tested.
ī‚˛ A critical difference is that the first stage of change
implementation may involve program understanding,
especially if the original system developers are not
responsible for the change implementation.
ī‚˛ During the program understanding phase, you have to
understand how the program is structured, how it
delivers functionality and how the proposed change
might affect the program.
Chapter 9 Software Evolution 13
30/10/2014
Urgent change requests
ī‚˛ Urgent changes may have to be implemented without
going through all stages of the software engineering
process
ī‚§ If a serious system fault has to be repaired to allow normal
operation to continue;
ī‚§ If changes to the system’s environment (e.g. an OS upgrade)
have unexpected effects;
ī‚§ If there are business changes that require a very rapid response
(e.g. the release of a competing product).
Chapter 9 Software Evolution 14
30/10/2014
The emergency repair process
Chapter 9 Software Evolution 15
30/10/2014
Agile methods and evolution
ī‚˛ Agile methods are based on incremental development so
the transition from development to evolution is a
seamless one.
ī‚§ Evolution is simply a continuation of the development process
based on frequent system releases.
ī‚˛ Automated regression testing is particularly valuable
when changes are made to a system.
ī‚˛ Changes may be expressed as additional user stories.
Chapter 9 Software Evolution 16
30/10/2014
Handover problems
ī‚˛ Where the development team have used an agile
approach but the evolution team is unfamiliar with agile
methods and prefer a plan-based approach.
ī‚§ The evolution team may expect detailed documentation to
support evolution and this is not produced in agile processes.
ī‚˛ Where a plan-based approach has been used for
development but the evolution team prefer to use agile
methods.
ī‚§ The evolution team may have to start from scratch developing
automated tests and the code in the system may not have been
refactored and simplified as is expected in agile development.
Chapter 9 Software Evolution 17
30/10/2014
Legacy systems
Chapter 9 Software Evolution 18
30/10/2014
Legacy systems
ī‚˛ Legacy systems are older systems that rely on
languages and technology that are no longer used for
new systems development.
ī‚˛ Legacy software may be dependent on older hardware,
such as mainframe computers and may have associated
legacy processes and procedures.
ī‚˛ Legacy systems are not just software systems but are
broader socio-technical systems that include hardware,
software, libraries and other supporting software and
business processes.
Chapter 9 Software Evolution 19
30/10/2014
The elements of a legacy system
Chapter 9 Software Evolution 20
30/10/2014
Legacy system components
ī‚˛ System hardware Legacy systems may have been
written for hardware that is no longer available.
ī‚˛ Support software The legacy system may rely on a
range of support software, which may be obsolete or
unsupported.
ī‚˛ Application software The application system that
provides the business services is usually made up of a
number of application programs.
ī‚˛ Application data These are data that are processed by
the application system. They may be inconsistent,
duplicated or held in different databases.
Chapter 9 Software Evolution 21
30/10/2014
Legacy system components
ī‚˛ Business processes These are processes that are used
in the business to achieve some business objective.
ī‚˛ Business processes may be designed around a legacy
system and constrained by the functionality that it
provides.
ī‚˛ Business policies and rules These are definitions of how
the business should be carried out and constraints on
the business. Use of the legacy application system may
be embedded in these policies and rules.
Chapter 9 Software Evolution 22
30/10/2014
Legacy system layers
Chapter 9 Software Evolution 23
30/10/2014
Legacy system replacement
ī‚˛ Legacy system replacement is risky and expensive so
businesses continue to use these systems
ī‚˛ System replacement is risky for a number of reasons
ī‚§ Lack of complete system specification
ī‚§ Tight integration of system and business processes
ī‚§ Undocumented business rules embedded in the legacy system
ī‚§ New software development may be late and/or over budget
Chapter 9 Software Evolution 24
30/10/2014
Legacy system change
ī‚˛ Legacy systems are expensive to change for a number
of reasons:
ī‚§ No consistent programming style
ī‚§ Use of obsolete programming languages with few people
available with these language skills
ī‚§ Inadequate system documentation
ī‚§ System structure degradation
ī‚§ Program optimizations may make them hard to understand
ī‚§ Data errors, duplication and inconsistency
Chapter 9 Software Evolution 25
30/10/2014
Legacy system management
ī‚˛ Organisations that rely on legacy systems must choose
a strategy for evolving these systems
ī‚§ Scrap the system completely and modify business processes so
that it is no longer required;
ī‚§ Continue maintaining the system;
ī‚§ Transform the system by re-engineering to improve its
maintainability;
ī‚§ Replace the system with a new system.
ī‚˛ The strategy chosen should depend on the system
quality and its business value.
Chapter 9 Software Evolution 26
30/10/2014
Figure 9.13 An example of a legacy system
assessment
Chapter 9 Software Evolution 27
30/10/2014
Legacy system categories
ī‚˛ Low quality, low business value
ī‚§ These systems should be scrapped.
ī‚˛ Low-quality, high-business value
ī‚§ These make an important business contribution but are
expensive to maintain. Should be re-engineered or replaced if a
suitable system is available.
ī‚˛ High-quality, low-business value
ī‚§ Replace with COTS, scrap completely or maintain.
ī‚˛ High-quality, high business value
ī‚§ Continue in operation using normal system maintenance.
Chapter 9 Software Evolution 28
30/10/2014
Business value assessment
ī‚˛ Assessment should take different viewpoints into
account
ī‚§ System end-users;
ī‚§ Business customers;
ī‚§ Line managers;
ī‚§ IT managers;
ī‚§ Senior managers.
ī‚˛ Interview different stakeholders and collate results.
Chapter 9 Software Evolution 29
30/10/2014
Issues in business value assessment
ī‚˛ The use of the system
ī‚§ If systems are only used occasionally or by a small number of
people, they may have a low business value.
ī‚˛ The business processes that are supported
ī‚§ A system may have a low business value if it forces the use of
inefficient business processes.
ī‚˛ System dependability
ī‚§ If a system is not dependable and the problems directly affect
business customers, the system has a low business value.
ī‚˛ The system outputs
ī‚§ If the business depends on system outputs, then the system has
a high business value.
Chapter 9 Software Evolution 30
30/10/2014
System quality assessment
ī‚˛ Business process assessment
ī‚§ How well does the business process support the current goals of
the business?
ī‚˛ Environment assessment
ī‚§ How effective is the system’s environment and how expensive is
it to maintain?
ī‚˛ Application assessment
ī‚§ What is the quality of the application software system?
Chapter 9 Software Evolution 31
30/10/2014
Business process assessment
ī‚˛ Use a viewpoint-oriented approach and seek answers
from system stakeholders
ī‚§ Is there a defined process model and is it followed?
ī‚§ Do different parts of the organisation use different processes for
the same function?
ī‚§ How has the process been adapted?
ī‚§ What are the relationships with other business processes and
are these necessary?
ī‚§ Is the process effectively supported by the legacy application
software?
ī‚˛ Example - a travel ordering system may have a low
business value because of the widespread use of web-
based ordering.
Chapter 9 Software Evolution 32
30/10/2014
Factors used in environment assessment
Factor Questions
Supplier stability Is the supplier still in existence? Is the supplier financially stable and
likely to continue in existence? If the supplier is no longer in business,
does someone else maintain the systems?
Failure rate Does the hardware have a high rate of reported failures? Does the
support software crash and force system restarts?
Age How old is the hardware and software? The older the hardware and
support software, the more obsolete it will be. It may still function
correctly but there could be significant economic and business
benefits to moving to a more modern system.
Performance Is the performance of the system adequate? Do performance
problems have a significant effect on system users?
Chapter 9 Software Evolution 33
30/10/2014
Factors used in environment assessment
Factor Questions
Support requirements What local support is required by the hardware and
software? If there are high costs associated with this
support, it may be worth considering system replacement.
Maintenance costs What are the costs of hardware maintenance and support
software licences? Older hardware may have higher
maintenance costs than modern systems. Support software
may have high annual licensing costs.
Interoperability Are there problems interfacing the system to other systems?
Can compilers, for example, be used with current versions
of the operating system? Is hardware emulation required?
Chapter 9 Software Evolution 34
30/10/2014
Factors used in application assessment
Factor Questions
Understandability How difficult is it to understand the source code of the current
system? How complex are the control structures that are used?
Do variables have meaningful names that reflect their function?
Documentation What system documentation is available? Is the documentation
complete, consistent, and current?
Data Is there an explicit data model for the system? To what extent is
data duplicated across files? Is the data used by the system up to
date and consistent?
Performance Is the performance of the application adequate? Do performance
problems have a significant effect on system users?
Chapter 9 Software Evolution 35
30/10/2014
Factors used in application assessment
Factor Questions
Programming language Are modern compilers available for the programming
language used to develop the system? Is the programming
language still used for new system development?
Configuration
management
Are all versions of all parts of the system managed by a
configuration management system? Is there an explicit
description of the versions of components that are used in
the current system?
Test data Does test data for the system exist? Is there a record of
regression tests carried out when new features have been
added to the system?
Personnel skills Are there people available who have the skills to maintain the
application? Are there people available who have experience
with the system?
Chapter 9 Software Evolution 36
30/10/2014
System measurement
ī‚˛ You may collect quantitative data to make an
assessment of the quality of the application system
ī‚§ The number of system change requests; The higher this
accumulated value, the lower the quality of the system.
ī‚§ The number of different user interfaces used by the system; The
more interfaces, the more likely it is that there will be
inconsistencies and redundancies in these interfaces.
ī‚§ The volume of data used by the system. As the volume of data
(number of files, size of database, etc.) processed by the system
increases, so too do the inconsistencies and errors in that data.
ī‚§ Cleaning up old data is a very expensive and time-consuming
process
Chapter 9 Software Evolution 37
30/10/2014
Software maintenance
Chapter 9 Software Evolution 38
30/10/2014
Software maintenance
ī‚˛ Modifying a program after it has been put into use.
ī‚˛ The term is mostly used for changing custom software.
Generic software products are said to evolve to create
new versions.
ī‚˛ Maintenance does not normally involve major changes to
the system’s architecture.
ī‚˛ Changes are implemented by modifying existing
components and adding new components to the system.
Chapter 9 Software Evolution 39
30/10/2014
Types of maintenance
ī‚˛ Fault repairs
ī‚§ Changing a system to fix bugs/vulnerabilities and correct
deficiencies in the way meets its requirements.
ī‚˛ Environmental adaptation
ī‚§ Maintenance to adapt software to a different operating
environment
ī‚§ Changing a system so that it operates in a different environment
(computer, OS, etc.) from its initial implementation.
ī‚˛ Functionality addition and modification
ī‚§ Modifying the system to satisfy new requirements.
Chapter 9 Software Evolution 40
30/10/2014
Maintenance effort distribution
Chapter 9 Software Evolution 41
30/10/2014
Maintenance costs
ī‚˛ Usually greater than development costs (2* to
100* depending on the application).
ī‚˛ Affected by both technical and non-technical
factors.
ī‚˛ Increases as software is maintained.
Maintenance corrupts the software structure so
makes further maintenance more difficult.
ī‚˛ Ageing software can have high support costs
(e.g. old languages, compilers etc.).
Chapter 9 Software Evolution 42
30/10/2014
Maintenance costs
ī‚˛ It is usually more expensive to add new features to a
system during maintenance than it is to add the same
features during development
ī‚§ A new team has to understand the programs being maintained
ī‚§ Separating maintenance and development means there is no
incentive for the development team to write maintainable
software
ī‚§ Program maintenance work is unpopular
â€ĸ Maintenance staff are often inexperienced and have limited domain
knowledge.
ī‚§ As programs age, their structure degrades and they become
harder to change
Chapter 9 Software Evolution 43
30/10/2014
Maintenance prediction
ī‚˛ Maintenance prediction is concerned with assessing
which parts of the system may cause problems and have
high maintenance costs
ī‚§ Change acceptance depends on the maintainability of the
components affected by the change;
ī‚§ Implementing changes degrades the system and reduces its
maintainability;
ī‚§ Maintenance costs depend on the number of changes and costs
of change depend on maintainability.
Chapter 9 Software Evolution 44
30/10/2014
Maintenance prediction
Chapter 9 Software Evolution 45
30/10/2014
Change prediction
ī‚˛ Predicting the number of changes requires and
understanding of the relationships between a system
and its environment.
ī‚˛ Tightly coupled systems require changes whenever the
environment is changed.
ī‚˛ Factors influencing this relationship are
ī‚§ Number and complexity of system interfaces;
ī‚§ Number of inherently volatile system requirements;
ī‚§ The business processes where the system is used.
Chapter 9 Software Evolution 46
30/10/2014
Complexity metrics
ī‚˛ Predictions of maintainability can be made by assessing
the complexity of system components.
ī‚˛ Studies have shown that most maintenance effort is
spent on a relatively small number of system
components.
ī‚˛ Complexity depends on
ī‚§ Complexity of control structures;
ī‚§ Complexity of data structures;
ī‚§ Object, method (procedure) and module size.
Chapter 9 Software Evolution 47
30/10/2014
Process metrics
ī‚˛ Process metrics may be used to assess maintainability
ī‚§ Number of requests for corrective maintenance;
ī‚§ Average time required for impact analysis;
ī‚§ Average time taken to implement a change request;
ī‚§ Number of outstanding change requests.
ī‚˛ If any or all of these is increasing, this may indicate a
decline in maintainability.
Chapter 9 Software Evolution 48
30/10/2014
Software reengineering
ī‚˛ Restructuring or rewriting part or all of a
legacy system without changing its
functionality.
ī‚˛ Applicable where some but not all sub-systems
of a larger system require frequent
maintenance.
ī‚˛ Reengineering involves adding effort to make
them easier to maintain. The system may be re-
structured and re-documented.
Chapter 9 Software Evolution 49
30/10/2014
Advantages of reengineering
ī‚˛ Reduced risk
ī‚§ There is a high risk in new software development. There may be
development problems, staffing problems and specification
problems.
ī‚˛ Reduced cost
ī‚§ The cost of re-engineering is often significantly less than the
costs of developing new software.
Chapter 9 Software Evolution 50
30/10/2014
The reengineering process
Chapter 9 Software Evolution 51
30/10/2014
Reengineering process activities
ī‚˛ Source code translation
ī‚§ Convert code to a new language.
ī‚˛ Reverse engineering
ī‚§ Analyse the program to understand it;
ī‚˛ Program structure improvement
ī‚§ Restructure automatically for understandability;
ī‚˛ Program modularisation
ī‚§ Reorganise the program structure;
ī‚˛ Data reengineering
ī‚§ Clean-up and restructure system data.
Chapter 9 Software Evolution 52
30/10/2014
Reengineering approaches
Chapter 9 Software Evolution 53
30/10/2014
Reengineering cost factors
ī‚˛ The quality of the software to be reengineered.
ī‚˛ The tool support available for reengineering.
ī‚˛ The extent of the data conversion which is required.
ī‚˛ The availability of expert staff for reengineering.
ī‚§ This can be a problem with old systems based on technology
that is no longer widely used.
Chapter 9 Software Evolution 54
30/10/2014
Refactoring
ī‚˛ Refactoring is the process of making improvements to a
program to slow down degradation through change.
ī‚˛ You can think of refactoring as ‘preventative
maintenance’ that reduces the problems of future
change.
ī‚˛ Refactoring involves modifying a program to improve its
structure, reduce its complexity or make it easier to
understand.
ī‚˛ When you refactor a program, you should not add
functionality but rather concentrate on program
improvement.
Chapter 9 Software Evolution 55
30/10/2014
Refactoring and reengineering
ī‚˛ Re-engineering takes place after a system has been
maintained for some time and maintenance costs are
increasing. You use automated tools to process and re-
engineer a legacy system to create a new system that is
more maintainable.
ī‚˛ Refactoring is a continuous process of improvement
throughout the development and evolution process. It is
intended to avoid the structure and code degradation
that increases the costs and difficulties of maintaining a
system.
Chapter 9 Software Evolution 56
30/10/2014
‘Bad smells’ in program code
ī‚˛ Duplicate code
ī‚§ The same or very similar code may be included at different
places in a program. This can be removed and implemented as a
single method or function that is called as required.
ī‚˛ Long methods
ī‚§ If a method is too long, it should be redesigned as a number of
shorter methods.
ī‚˛ Switch (case) statements
ī‚§ These often involve duplication, where the switch depends on
the type of a value. The switch statements may be scattered
around a program. In object-oriented languages, you can often
use polymorphism to achieve the same thing.
Chapter 9 Software Evolution 57
30/10/2014
‘Bad smells’ in program code
ī‚˛ Data clumping
ī‚§ Data clumps occur when the same group of data items (fields in
classes, parameters in methods) re-occur in several places in a
program. These can often be replaced with an object that
encapsulates all of the data.
ī‚˛ Speculative generality
ī‚§ This occurs when developers include generality in a program in
case it is required in the future. This can often simply be
removed.
Chapter 9 Software Evolution 58
30/10/2014
Key points
ī‚˛ Software development and evolution can be thought of
as an integrated, iterative process that can be
represented using a spiral model.
ī‚˛ For custom systems, the costs of software maintenance
usually exceed the software development costs.
ī‚˛ The process of software evolution is driven by requests
for changes and includes change impact analysis,
release planning and change implementation.
ī‚˛ Legacy systems are older software systems, developed
using obsolete software and hardware technologies, that
remain useful for a business.
Chapter 9 Software Evolution 59
30/10/2014
Key points
ī‚˛ It is often cheaper and less risky to maintain a legacy
system than to develop a replacement system using
modern technology.
ī‚˛ The business value of a legacy system and the quality of
the application should be assessed to help decide if a
system should be replaced, transformed or maintained.
ī‚˛ There are 3 types of software maintenance, namely bug
fixing, modifying software to work in a new environment,
and implementing new or changed requirements.
Chapter 9 Software Evolution 60
30/10/2014
Key points
ī‚˛ Software re-engineering is concerned with re-structuring
and re-documenting software to make it easier to
understand and change.
ī‚˛ Refactoring, making program changes that preserve
functionality, is a form of preventative maintenance.
Chapter 9 Software Evolution 61
30/10/2014

More Related Content

What's hot (20)

Ch6 architectural design
Ch6 architectural designCh6 architectural design
Ch6 architectural design
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9
 
Ch2 - SW Processes
Ch2 - SW ProcessesCh2 - SW Processes
Ch2 - SW Processes
 
Ch5 system modeling
Ch5 system modelingCh5 system modeling
Ch5 system modeling
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 
Ch10 dependable systems
Ch10 dependable systemsCh10 dependable systems
Ch10 dependable systems
 
Ch3 - Agile SW Dev
Ch3 - Agile SW DevCh3 - Agile SW Dev
Ch3 - Agile SW Dev
 
Ch4 - Req Eng
Ch4 - Req EngCh4 - Req Eng
Ch4 - Req Eng
 
Ch8.testing
Ch8.testingCh8.testing
Ch8.testing
 
Ian Sommerville, Software Engineering, 9th EditionCh 8
Ian Sommerville,  Software Engineering, 9th EditionCh 8Ian Sommerville,  Software Engineering, 9th EditionCh 8
Ian Sommerville, Software Engineering, 9th EditionCh 8
 
Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9
 
Ch22 - Project Management
Ch22 - Project ManagementCh22 - Project Management
Ch22 - Project Management
 
Ch25 configuration management
Ch25 configuration managementCh25 configuration management
Ch25 configuration management
 
Ch3. agile sw dev
Ch3. agile sw devCh3. agile sw dev
Ch3. agile sw dev
 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9
 
Ch23 project planning
Ch23 project planningCh23 project planning
Ch23 project planning
 
Ch4 req eng
Ch4 req engCh4 req eng
Ch4 req eng
 
Ch2 sw processes
Ch2 sw processesCh2 sw processes
Ch2 sw processes
 
Ch19 systems engineering
Ch19 systems engineeringCh19 systems engineering
Ch19 systems engineering
 

Similar to Ch9 - Evolution

SE2013_10.ppt
SE2013_10.pptSE2013_10.ppt
SE2013_10.pptCarlPilac1
 
Lecture - 11-15.pptx
Lecture - 11-15.pptxLecture - 11-15.pptx
Lecture - 11-15.pptxFarHana74914
 
Bse 3105 lecture 2- software change
Bse 3105  lecture 2- software changeBse 3105  lecture 2- software change
Bse 3105 lecture 2- software changeAlonzee Tash
 
Bse 3105 lecture 2- software change
Bse 3105  lecture 2- software changeBse 3105  lecture 2- software change
Bse 3105 lecture 2- software changeAlonzee Tash
 
Ch2 software engineering and Processes.pdf
Ch2 software engineering and Processes.pdfCh2 software engineering and Processes.pdf
Ch2 software engineering and Processes.pdfahmedibrahimghnnam01
 
Chapter 2 Software Processes.pdf
Chapter 2 Software Processes.pdfChapter 2 Software Processes.pdf
Chapter 2 Software Processes.pdfHardikGupta400524
 
ch2swprocesses-150102101840-conversion-gate02.pdf
ch2swprocesses-150102101840-conversion-gate02.pdfch2swprocesses-150102101840-conversion-gate02.pdf
ch2swprocesses-150102101840-conversion-gate02.pdfabdallhelkahlout1
 
Process in Software Engineering/4'ps in Software Engineerin
Process in Software Engineering/4'ps in Software EngineerinProcess in Software Engineering/4'ps in Software Engineerin
Process in Software Engineering/4'ps in Software EngineerinMuhammadSufianJani
 
Software Evolution
Software EvolutionSoftware Evolution
Software EvolutionMuhammad Asim
 
Upstate CSCI 540 Agile Development
Upstate CSCI 540 Agile DevelopmentUpstate CSCI 540 Agile Development
Upstate CSCI 540 Agile DevelopmentDanWooster1
 
ch3-150102101842-conversion-gate02.pdf
ch3-150102101842-conversion-gate02.pdfch3-150102101842-conversion-gate02.pdf
ch3-150102101842-conversion-gate02.pdfabdallhelkahlout1
 
LU 3 Agile SW Dev.pptx
LU 3 Agile SW Dev.pptxLU 3 Agile SW Dev.pptx
LU 3 Agile SW Dev.pptxTAISEEREISA
 
Software maintaince.pptx
Software maintaince.pptxSoftware maintaince.pptx
Software maintaince.pptxAmarYa2
 
Agile - Software - Development Powerpoint
Agile - Software - Development PowerpointAgile - Software - Development Powerpoint
Agile - Software - Development Powerpointjohncalebtan
 
SWE-401 - 11. Software maintenance overview
SWE-401 - 11. Software maintenance overviewSWE-401 - 11. Software maintenance overview
SWE-401 - 11. Software maintenance overviewghayour abbas
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activitiessommerville-videos
 

Similar to Ch9 - Evolution (20)

Ch9
Ch9Ch9
Ch9
 
SE2013_10.ppt
SE2013_10.pptSE2013_10.ppt
SE2013_10.ppt
 
Lecture - 11-15.pptx
Lecture - 11-15.pptxLecture - 11-15.pptx
Lecture - 11-15.pptx
 
Software maintenance
Software maintenanceSoftware maintenance
Software maintenance
 
Bse 3105 lecture 2- software change
Bse 3105  lecture 2- software changeBse 3105  lecture 2- software change
Bse 3105 lecture 2- software change
 
Bse 3105 lecture 2- software change
Bse 3105  lecture 2- software changeBse 3105  lecture 2- software change
Bse 3105 lecture 2- software change
 
Ch2 software engineering and Processes.pdf
Ch2 software engineering and Processes.pdfCh2 software engineering and Processes.pdf
Ch2 software engineering and Processes.pdf
 
Chapter 2 Software Processes.pdf
Chapter 2 Software Processes.pdfChapter 2 Software Processes.pdf
Chapter 2 Software Processes.pdf
 
ch2swprocesses-150102101840-conversion-gate02.pdf
ch2swprocesses-150102101840-conversion-gate02.pdfch2swprocesses-150102101840-conversion-gate02.pdf
ch2swprocesses-150102101840-conversion-gate02.pdf
 
Process in Software Engineering/4'ps in Software Engineerin
Process in Software Engineering/4'ps in Software EngineerinProcess in Software Engineering/4'ps in Software Engineerin
Process in Software Engineering/4'ps in Software Engineerin
 
Software Evolution
Software EvolutionSoftware Evolution
Software Evolution
 
Upstate CSCI 540 Agile Development
Upstate CSCI 540 Agile DevelopmentUpstate CSCI 540 Agile Development
Upstate CSCI 540 Agile Development
 
ch3-150102101842-conversion-gate02.pdf
ch3-150102101842-conversion-gate02.pdfch3-150102101842-conversion-gate02.pdf
ch3-150102101842-conversion-gate02.pdf
 
LU 3 Agile SW Dev.pptx
LU 3 Agile SW Dev.pptxLU 3 Agile SW Dev.pptx
LU 3 Agile SW Dev.pptx
 
Software process
Software processSoftware process
Software process
 
Software maintaince.pptx
Software maintaince.pptxSoftware maintaince.pptx
Software maintaince.pptx
 
Agile - Software - Development Powerpoint
Agile - Software - Development PowerpointAgile - Software - Development Powerpoint
Agile - Software - Development Powerpoint
 
SWE-401 - 11. Software maintenance overview
SWE-401 - 11. Software maintenance overviewSWE-401 - 11. Software maintenance overview
SWE-401 - 11. Software maintenance overview
 
Ch21
Ch21Ch21
Ch21
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 

More from Harsh Verdhan Raj

Ch25 - Configuration Management
Ch25 - Configuration ManagementCh25 - Configuration Management
Ch25 - Configuration ManagementHarsh Verdhan Raj
 
Ch24 - Quality Management
Ch24 - Quality ManagementCh24 - Quality Management
Ch24 - Quality ManagementHarsh Verdhan Raj
 
Ch23 - Project Planning
Ch23 - Project PlanningCh23 - Project Planning
Ch23 - Project PlanningHarsh Verdhan Raj
 
Ch21 - Real Time Software Engineering
Ch21 - Real Time Software EngineeringCh21 - Real Time Software Engineering
Ch21 - Real Time Software EngineeringHarsh Verdhan Raj
 
Ch20 - Systems of Systems
Ch20 - Systems of SystemsCh20 - Systems of Systems
Ch20 - Systems of SystemsHarsh Verdhan Raj
 
Ch19 - Systems Engineering
Ch19 - Systems EngineeringCh19 - Systems Engineering
Ch19 - Systems EngineeringHarsh Verdhan Raj
 
Ch17 - Distributed Software Engineering
Ch17 - Distributed Software EngineeringCh17 - Distributed Software Engineering
Ch17 - Distributed Software EngineeringHarsh Verdhan Raj
 
Ch16 - Component Based Software Engineering
Ch16 - Component Based Software EngineeringCh16 - Component Based Software Engineering
Ch16 - Component Based Software EngineeringHarsh Verdhan Raj
 
Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience EngineeringHarsh Verdhan Raj
 
Ch13 - Security Engineering
Ch13 - Security EngineeringCh13 - Security Engineering
Ch13 - Security EngineeringHarsh Verdhan Raj
 
Ch12 - Safety Engineering
Ch12 - Safety EngineeringCh12 - Safety Engineering
Ch12 - Safety EngineeringHarsh Verdhan Raj
 
Ch11 - Reliability Engineering
Ch11 - Reliability EngineeringCh11 - Reliability Engineering
Ch11 - Reliability EngineeringHarsh Verdhan Raj
 
Ch10 - Dependable Systems
Ch10 - Dependable SystemsCh10 - Dependable Systems
Ch10 - Dependable SystemsHarsh Verdhan Raj
 
FDS (Sixth Edition) | C1 | Databases and Database Users
FDS (Sixth Edition) | C1 | Databases and Database UsersFDS (Sixth Edition) | C1 | Databases and Database Users
FDS (Sixth Edition) | C1 | Databases and Database UsersHarsh Verdhan Raj
 

More from Harsh Verdhan Raj (17)

Ch25 - Configuration Management
Ch25 - Configuration ManagementCh25 - Configuration Management
Ch25 - Configuration Management
 
Ch24 - Quality Management
Ch24 - Quality ManagementCh24 - Quality Management
Ch24 - Quality Management
 
Ch23 - Project Planning
Ch23 - Project PlanningCh23 - Project Planning
Ch23 - Project Planning
 
Ch21 - Real Time Software Engineering
Ch21 - Real Time Software EngineeringCh21 - Real Time Software Engineering
Ch21 - Real Time Software Engineering
 
Ch20 - Systems of Systems
Ch20 - Systems of SystemsCh20 - Systems of Systems
Ch20 - Systems of Systems
 
Ch19 - Systems Engineering
Ch19 - Systems EngineeringCh19 - Systems Engineering
Ch19 - Systems Engineering
 
Ch17 - Distributed Software Engineering
Ch17 - Distributed Software EngineeringCh17 - Distributed Software Engineering
Ch17 - Distributed Software Engineering
 
Ch16 - Component Based Software Engineering
Ch16 - Component Based Software EngineeringCh16 - Component Based Software Engineering
Ch16 - Component Based Software Engineering
 
Ch15 - Software Reuse
Ch15 - Software ReuseCh15 - Software Reuse
Ch15 - Software Reuse
 
Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience Engineering
 
Ch13 - Security Engineering
Ch13 - Security EngineeringCh13 - Security Engineering
Ch13 - Security Engineering
 
Ch12 - Safety Engineering
Ch12 - Safety EngineeringCh12 - Safety Engineering
Ch12 - Safety Engineering
 
Ch11 - Reliability Engineering
Ch11 - Reliability EngineeringCh11 - Reliability Engineering
Ch11 - Reliability Engineering
 
Ch10 - Dependable Systems
Ch10 - Dependable SystemsCh10 - Dependable Systems
Ch10 - Dependable Systems
 
Ch8 - Testing
Ch8 - TestingCh8 - Testing
Ch8 - Testing
 
Ch1 - Introduction
Ch1 - IntroductionCh1 - Introduction
Ch1 - Introduction
 
FDS (Sixth Edition) | C1 | Databases and Database Users
FDS (Sixth Edition) | C1 | Databases and Database UsersFDS (Sixth Edition) | C1 | Databases and Database Users
FDS (Sixth Edition) | C1 | Databases and Database Users
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

Ch9 - Evolution

  • 1. Chapter 9 – Software Evolution Chapter 9 Software Evolution 1 30/10/2014
  • 2. Topics covered ī‚˛ Evolution processes ī‚˛ Legacy systems ī‚˛ Software maintenance Chapter 9 Software Evolution 2 30/10/2014
  • 3. Software change ī‚˛ Software change is inevitable ī‚§ New requirements emerge when the software is used; ī‚§ The business environment changes; ī‚§ Errors must be repaired; ī‚§ New computers and equipment is added to the system; ī‚§ The performance or reliability of the system may have to be improved. ī‚˛ A key problem for all organizations is implementing and managing change to their existing software systems. Chapter 9 Software Evolution 3 30/10/2014
  • 4. Importance of evolution ī‚˛ Organisations have huge investments in their software systems - they are critical business assets. ī‚˛ To maintain the value of these assets to the business, they must be changed and updated. ī‚˛ The majority of the software budget in large companies is devoted to changing and evolving existing software rather than developing new software. Chapter 9 Software Evolution 4 30/10/2014
  • 5. A spiral model of development and evolution Chapter 9 Software Evolution 5 30/10/2014
  • 6. Evolution and servicing Chapter 9 Software Evolution 6 30/10/2014
  • 7. Evolution and servicing ī‚˛ Evolution ī‚§ The stage in a software system’s life cycle where it is in operational use and is evolving as new requirements are proposed and implemented in the system. ī‚˛ Servicing ī‚§ At this stage, the software remains useful but the only changes made are those required to keep it operational i.e. bug fixes and changes to reflect changes in the software’s environment. No new functionality is added. ī‚˛ Phase-out ī‚§ The software may still be used but no further changes are made to it. Chapter 9 Software Evolution 7 30/10/2014
  • 8. Evolution processes Chapter 9 Software Evolution 8 30/10/2014
  • 9. Evolution processes ī‚˛ Software evolution processes depend on ī‚§ The type of software being maintained; ī‚§ The development processes used; ī‚§ The skills and experience of the people involved. ī‚˛ Proposals for change are the driver for system evolution. ī‚§ Should be linked with components that are affected by the change, thus allowing the cost and impact of the change to be estimated. ī‚˛ Change identification and evolution continues throughout the system lifetime. Chapter 9 Software Evolution 9 30/10/2014
  • 10. Change identification and evolution processes Chapter 9 Software Evolution 10 30/10/2014
  • 11. The software evolution process Chapter 9 Software Evolution 11 30/10/2014
  • 12. Change implementation Chapter 9 Software Evolution 12 30/10/2014
  • 13. Change implementation ī‚˛ Iteration of the development process where the revisions to the system are designed, implemented and tested. ī‚˛ A critical difference is that the first stage of change implementation may involve program understanding, especially if the original system developers are not responsible for the change implementation. ī‚˛ During the program understanding phase, you have to understand how the program is structured, how it delivers functionality and how the proposed change might affect the program. Chapter 9 Software Evolution 13 30/10/2014
  • 14. Urgent change requests ī‚˛ Urgent changes may have to be implemented without going through all stages of the software engineering process ī‚§ If a serious system fault has to be repaired to allow normal operation to continue; ī‚§ If changes to the system’s environment (e.g. an OS upgrade) have unexpected effects; ī‚§ If there are business changes that require a very rapid response (e.g. the release of a competing product). Chapter 9 Software Evolution 14 30/10/2014
  • 15. The emergency repair process Chapter 9 Software Evolution 15 30/10/2014
  • 16. Agile methods and evolution ī‚˛ Agile methods are based on incremental development so the transition from development to evolution is a seamless one. ī‚§ Evolution is simply a continuation of the development process based on frequent system releases. ī‚˛ Automated regression testing is particularly valuable when changes are made to a system. ī‚˛ Changes may be expressed as additional user stories. Chapter 9 Software Evolution 16 30/10/2014
  • 17. Handover problems ī‚˛ Where the development team have used an agile approach but the evolution team is unfamiliar with agile methods and prefer a plan-based approach. ī‚§ The evolution team may expect detailed documentation to support evolution and this is not produced in agile processes. ī‚˛ Where a plan-based approach has been used for development but the evolution team prefer to use agile methods. ī‚§ The evolution team may have to start from scratch developing automated tests and the code in the system may not have been refactored and simplified as is expected in agile development. Chapter 9 Software Evolution 17 30/10/2014
  • 18. Legacy systems Chapter 9 Software Evolution 18 30/10/2014
  • 19. Legacy systems ī‚˛ Legacy systems are older systems that rely on languages and technology that are no longer used for new systems development. ī‚˛ Legacy software may be dependent on older hardware, such as mainframe computers and may have associated legacy processes and procedures. ī‚˛ Legacy systems are not just software systems but are broader socio-technical systems that include hardware, software, libraries and other supporting software and business processes. Chapter 9 Software Evolution 19 30/10/2014
  • 20. The elements of a legacy system Chapter 9 Software Evolution 20 30/10/2014
  • 21. Legacy system components ī‚˛ System hardware Legacy systems may have been written for hardware that is no longer available. ī‚˛ Support software The legacy system may rely on a range of support software, which may be obsolete or unsupported. ī‚˛ Application software The application system that provides the business services is usually made up of a number of application programs. ī‚˛ Application data These are data that are processed by the application system. They may be inconsistent, duplicated or held in different databases. Chapter 9 Software Evolution 21 30/10/2014
  • 22. Legacy system components ī‚˛ Business processes These are processes that are used in the business to achieve some business objective. ī‚˛ Business processes may be designed around a legacy system and constrained by the functionality that it provides. ī‚˛ Business policies and rules These are definitions of how the business should be carried out and constraints on the business. Use of the legacy application system may be embedded in these policies and rules. Chapter 9 Software Evolution 22 30/10/2014
  • 23. Legacy system layers Chapter 9 Software Evolution 23 30/10/2014
  • 24. Legacy system replacement ī‚˛ Legacy system replacement is risky and expensive so businesses continue to use these systems ī‚˛ System replacement is risky for a number of reasons ī‚§ Lack of complete system specification ī‚§ Tight integration of system and business processes ī‚§ Undocumented business rules embedded in the legacy system ī‚§ New software development may be late and/or over budget Chapter 9 Software Evolution 24 30/10/2014
  • 25. Legacy system change ī‚˛ Legacy systems are expensive to change for a number of reasons: ī‚§ No consistent programming style ī‚§ Use of obsolete programming languages with few people available with these language skills ī‚§ Inadequate system documentation ī‚§ System structure degradation ī‚§ Program optimizations may make them hard to understand ī‚§ Data errors, duplication and inconsistency Chapter 9 Software Evolution 25 30/10/2014
  • 26. Legacy system management ī‚˛ Organisations that rely on legacy systems must choose a strategy for evolving these systems ī‚§ Scrap the system completely and modify business processes so that it is no longer required; ī‚§ Continue maintaining the system; ī‚§ Transform the system by re-engineering to improve its maintainability; ī‚§ Replace the system with a new system. ī‚˛ The strategy chosen should depend on the system quality and its business value. Chapter 9 Software Evolution 26 30/10/2014
  • 27. Figure 9.13 An example of a legacy system assessment Chapter 9 Software Evolution 27 30/10/2014
  • 28. Legacy system categories ī‚˛ Low quality, low business value ī‚§ These systems should be scrapped. ī‚˛ Low-quality, high-business value ī‚§ These make an important business contribution but are expensive to maintain. Should be re-engineered or replaced if a suitable system is available. ī‚˛ High-quality, low-business value ī‚§ Replace with COTS, scrap completely or maintain. ī‚˛ High-quality, high business value ī‚§ Continue in operation using normal system maintenance. Chapter 9 Software Evolution 28 30/10/2014
  • 29. Business value assessment ī‚˛ Assessment should take different viewpoints into account ī‚§ System end-users; ī‚§ Business customers; ī‚§ Line managers; ī‚§ IT managers; ī‚§ Senior managers. ī‚˛ Interview different stakeholders and collate results. Chapter 9 Software Evolution 29 30/10/2014
  • 30. Issues in business value assessment ī‚˛ The use of the system ī‚§ If systems are only used occasionally or by a small number of people, they may have a low business value. ī‚˛ The business processes that are supported ī‚§ A system may have a low business value if it forces the use of inefficient business processes. ī‚˛ System dependability ī‚§ If a system is not dependable and the problems directly affect business customers, the system has a low business value. ī‚˛ The system outputs ī‚§ If the business depends on system outputs, then the system has a high business value. Chapter 9 Software Evolution 30 30/10/2014
  • 31. System quality assessment ī‚˛ Business process assessment ī‚§ How well does the business process support the current goals of the business? ī‚˛ Environment assessment ī‚§ How effective is the system’s environment and how expensive is it to maintain? ī‚˛ Application assessment ī‚§ What is the quality of the application software system? Chapter 9 Software Evolution 31 30/10/2014
  • 32. Business process assessment ī‚˛ Use a viewpoint-oriented approach and seek answers from system stakeholders ī‚§ Is there a defined process model and is it followed? ī‚§ Do different parts of the organisation use different processes for the same function? ī‚§ How has the process been adapted? ī‚§ What are the relationships with other business processes and are these necessary? ī‚§ Is the process effectively supported by the legacy application software? ī‚˛ Example - a travel ordering system may have a low business value because of the widespread use of web- based ordering. Chapter 9 Software Evolution 32 30/10/2014
  • 33. Factors used in environment assessment Factor Questions Supplier stability Is the supplier still in existence? Is the supplier financially stable and likely to continue in existence? If the supplier is no longer in business, does someone else maintain the systems? Failure rate Does the hardware have a high rate of reported failures? Does the support software crash and force system restarts? Age How old is the hardware and software? The older the hardware and support software, the more obsolete it will be. It may still function correctly but there could be significant economic and business benefits to moving to a more modern system. Performance Is the performance of the system adequate? Do performance problems have a significant effect on system users? Chapter 9 Software Evolution 33 30/10/2014
  • 34. Factors used in environment assessment Factor Questions Support requirements What local support is required by the hardware and software? If there are high costs associated with this support, it may be worth considering system replacement. Maintenance costs What are the costs of hardware maintenance and support software licences? Older hardware may have higher maintenance costs than modern systems. Support software may have high annual licensing costs. Interoperability Are there problems interfacing the system to other systems? Can compilers, for example, be used with current versions of the operating system? Is hardware emulation required? Chapter 9 Software Evolution 34 30/10/2014
  • 35. Factors used in application assessment Factor Questions Understandability How difficult is it to understand the source code of the current system? How complex are the control structures that are used? Do variables have meaningful names that reflect their function? Documentation What system documentation is available? Is the documentation complete, consistent, and current? Data Is there an explicit data model for the system? To what extent is data duplicated across files? Is the data used by the system up to date and consistent? Performance Is the performance of the application adequate? Do performance problems have a significant effect on system users? Chapter 9 Software Evolution 35 30/10/2014
  • 36. Factors used in application assessment Factor Questions Programming language Are modern compilers available for the programming language used to develop the system? Is the programming language still used for new system development? Configuration management Are all versions of all parts of the system managed by a configuration management system? Is there an explicit description of the versions of components that are used in the current system? Test data Does test data for the system exist? Is there a record of regression tests carried out when new features have been added to the system? Personnel skills Are there people available who have the skills to maintain the application? Are there people available who have experience with the system? Chapter 9 Software Evolution 36 30/10/2014
  • 37. System measurement ī‚˛ You may collect quantitative data to make an assessment of the quality of the application system ī‚§ The number of system change requests; The higher this accumulated value, the lower the quality of the system. ī‚§ The number of different user interfaces used by the system; The more interfaces, the more likely it is that there will be inconsistencies and redundancies in these interfaces. ī‚§ The volume of data used by the system. As the volume of data (number of files, size of database, etc.) processed by the system increases, so too do the inconsistencies and errors in that data. ī‚§ Cleaning up old data is a very expensive and time-consuming process Chapter 9 Software Evolution 37 30/10/2014
  • 38. Software maintenance Chapter 9 Software Evolution 38 30/10/2014
  • 39. Software maintenance ī‚˛ Modifying a program after it has been put into use. ī‚˛ The term is mostly used for changing custom software. Generic software products are said to evolve to create new versions. ī‚˛ Maintenance does not normally involve major changes to the system’s architecture. ī‚˛ Changes are implemented by modifying existing components and adding new components to the system. Chapter 9 Software Evolution 39 30/10/2014
  • 40. Types of maintenance ī‚˛ Fault repairs ī‚§ Changing a system to fix bugs/vulnerabilities and correct deficiencies in the way meets its requirements. ī‚˛ Environmental adaptation ī‚§ Maintenance to adapt software to a different operating environment ī‚§ Changing a system so that it operates in a different environment (computer, OS, etc.) from its initial implementation. ī‚˛ Functionality addition and modification ī‚§ Modifying the system to satisfy new requirements. Chapter 9 Software Evolution 40 30/10/2014
  • 41. Maintenance effort distribution Chapter 9 Software Evolution 41 30/10/2014
  • 42. Maintenance costs ī‚˛ Usually greater than development costs (2* to 100* depending on the application). ī‚˛ Affected by both technical and non-technical factors. ī‚˛ Increases as software is maintained. Maintenance corrupts the software structure so makes further maintenance more difficult. ī‚˛ Ageing software can have high support costs (e.g. old languages, compilers etc.). Chapter 9 Software Evolution 42 30/10/2014
  • 43. Maintenance costs ī‚˛ It is usually more expensive to add new features to a system during maintenance than it is to add the same features during development ī‚§ A new team has to understand the programs being maintained ī‚§ Separating maintenance and development means there is no incentive for the development team to write maintainable software ī‚§ Program maintenance work is unpopular â€ĸ Maintenance staff are often inexperienced and have limited domain knowledge. ī‚§ As programs age, their structure degrades and they become harder to change Chapter 9 Software Evolution 43 30/10/2014
  • 44. Maintenance prediction ī‚˛ Maintenance prediction is concerned with assessing which parts of the system may cause problems and have high maintenance costs ī‚§ Change acceptance depends on the maintainability of the components affected by the change; ī‚§ Implementing changes degrades the system and reduces its maintainability; ī‚§ Maintenance costs depend on the number of changes and costs of change depend on maintainability. Chapter 9 Software Evolution 44 30/10/2014
  • 45. Maintenance prediction Chapter 9 Software Evolution 45 30/10/2014
  • 46. Change prediction ī‚˛ Predicting the number of changes requires and understanding of the relationships between a system and its environment. ī‚˛ Tightly coupled systems require changes whenever the environment is changed. ī‚˛ Factors influencing this relationship are ī‚§ Number and complexity of system interfaces; ī‚§ Number of inherently volatile system requirements; ī‚§ The business processes where the system is used. Chapter 9 Software Evolution 46 30/10/2014
  • 47. Complexity metrics ī‚˛ Predictions of maintainability can be made by assessing the complexity of system components. ī‚˛ Studies have shown that most maintenance effort is spent on a relatively small number of system components. ī‚˛ Complexity depends on ī‚§ Complexity of control structures; ī‚§ Complexity of data structures; ī‚§ Object, method (procedure) and module size. Chapter 9 Software Evolution 47 30/10/2014
  • 48. Process metrics ī‚˛ Process metrics may be used to assess maintainability ī‚§ Number of requests for corrective maintenance; ī‚§ Average time required for impact analysis; ī‚§ Average time taken to implement a change request; ī‚§ Number of outstanding change requests. ī‚˛ If any or all of these is increasing, this may indicate a decline in maintainability. Chapter 9 Software Evolution 48 30/10/2014
  • 49. Software reengineering ī‚˛ Restructuring or rewriting part or all of a legacy system without changing its functionality. ī‚˛ Applicable where some but not all sub-systems of a larger system require frequent maintenance. ī‚˛ Reengineering involves adding effort to make them easier to maintain. The system may be re- structured and re-documented. Chapter 9 Software Evolution 49 30/10/2014
  • 50. Advantages of reengineering ī‚˛ Reduced risk ī‚§ There is a high risk in new software development. There may be development problems, staffing problems and specification problems. ī‚˛ Reduced cost ī‚§ The cost of re-engineering is often significantly less than the costs of developing new software. Chapter 9 Software Evolution 50 30/10/2014
  • 51. The reengineering process Chapter 9 Software Evolution 51 30/10/2014
  • 52. Reengineering process activities ī‚˛ Source code translation ī‚§ Convert code to a new language. ī‚˛ Reverse engineering ī‚§ Analyse the program to understand it; ī‚˛ Program structure improvement ī‚§ Restructure automatically for understandability; ī‚˛ Program modularisation ī‚§ Reorganise the program structure; ī‚˛ Data reengineering ī‚§ Clean-up and restructure system data. Chapter 9 Software Evolution 52 30/10/2014
  • 53. Reengineering approaches Chapter 9 Software Evolution 53 30/10/2014
  • 54. Reengineering cost factors ī‚˛ The quality of the software to be reengineered. ī‚˛ The tool support available for reengineering. ī‚˛ The extent of the data conversion which is required. ī‚˛ The availability of expert staff for reengineering. ī‚§ This can be a problem with old systems based on technology that is no longer widely used. Chapter 9 Software Evolution 54 30/10/2014
  • 55. Refactoring ī‚˛ Refactoring is the process of making improvements to a program to slow down degradation through change. ī‚˛ You can think of refactoring as ‘preventative maintenance’ that reduces the problems of future change. ī‚˛ Refactoring involves modifying a program to improve its structure, reduce its complexity or make it easier to understand. ī‚˛ When you refactor a program, you should not add functionality but rather concentrate on program improvement. Chapter 9 Software Evolution 55 30/10/2014
  • 56. Refactoring and reengineering ī‚˛ Re-engineering takes place after a system has been maintained for some time and maintenance costs are increasing. You use automated tools to process and re- engineer a legacy system to create a new system that is more maintainable. ī‚˛ Refactoring is a continuous process of improvement throughout the development and evolution process. It is intended to avoid the structure and code degradation that increases the costs and difficulties of maintaining a system. Chapter 9 Software Evolution 56 30/10/2014
  • 57. ‘Bad smells’ in program code ī‚˛ Duplicate code ī‚§ The same or very similar code may be included at different places in a program. This can be removed and implemented as a single method or function that is called as required. ī‚˛ Long methods ī‚§ If a method is too long, it should be redesigned as a number of shorter methods. ī‚˛ Switch (case) statements ī‚§ These often involve duplication, where the switch depends on the type of a value. The switch statements may be scattered around a program. In object-oriented languages, you can often use polymorphism to achieve the same thing. Chapter 9 Software Evolution 57 30/10/2014
  • 58. ‘Bad smells’ in program code ī‚˛ Data clumping ī‚§ Data clumps occur when the same group of data items (fields in classes, parameters in methods) re-occur in several places in a program. These can often be replaced with an object that encapsulates all of the data. ī‚˛ Speculative generality ī‚§ This occurs when developers include generality in a program in case it is required in the future. This can often simply be removed. Chapter 9 Software Evolution 58 30/10/2014
  • 59. Key points ī‚˛ Software development and evolution can be thought of as an integrated, iterative process that can be represented using a spiral model. ī‚˛ For custom systems, the costs of software maintenance usually exceed the software development costs. ī‚˛ The process of software evolution is driven by requests for changes and includes change impact analysis, release planning and change implementation. ī‚˛ Legacy systems are older software systems, developed using obsolete software and hardware technologies, that remain useful for a business. Chapter 9 Software Evolution 59 30/10/2014
  • 60. Key points ī‚˛ It is often cheaper and less risky to maintain a legacy system than to develop a replacement system using modern technology. ī‚˛ The business value of a legacy system and the quality of the application should be assessed to help decide if a system should be replaced, transformed or maintained. ī‚˛ There are 3 types of software maintenance, namely bug fixing, modifying software to work in a new environment, and implementing new or changed requirements. Chapter 9 Software Evolution 60 30/10/2014
  • 61. Key points ī‚˛ Software re-engineering is concerned with re-structuring and re-documenting software to make it easier to understand and change. ī‚˛ Refactoring, making program changes that preserve functionality, is a form of preventative maintenance. Chapter 9 Software Evolution 61 30/10/2014