SlideShare a Scribd company logo
1 of 29
ESDS Software Solution Pvt. Ltd.
The Digital Transformation Catalyst
https://www.esds.co.in
Section BreakSection Break
https://www.esds.co.in
To Introduction to Software
Development Life Cycle:
Phases & Models
SDLC stands for Software Development Life
Cycle. It is a process that gives a complete idea
about developing, designing, and maintaining a
software project by ensuring that all the
functionalities along with user requirements,
objectives, and end goals are addressed. With
SDLC, the software project’s quality and the
overall software development process get
enhanced.
https://www.esds.co.in
Benefits of SDLC
1. Address the goals and problems to implement the
project with the highest precision and accuracy
2. SDLC does not allow the project members to proceed
ahead before completion & approval of the prior stages
3. Installation in the project executed with SDLC has
necessary checks to be tested with precision before
entering the installation stage
4. With a well-defined SDLC in place, project members can
continue the software development process without
incurring any complications
5. SDLC offers optimal control with minimum problems,
allowing the project members to run the project
smoothly
https://www.esds.co.in
Requirement
Gathering and
Analysis
Design
Development
Phase
Testing
Deployment
and
Maintenance
Stages of SDLC
https://www.esds.co.in
Stage 1
Requirement Gathering &
Analysis Phase
In an SDLC, this is the first and most crucial
phase for a software project’s success. In
this phase, communication takes place
between stakeholders, end-users, and
project teams, as both functional and non-
functional requirements are gathered from
customers.
https://www.esds.co.in
The Requirement Gathering & Analysis
Phase of SDLC involves the following
1. Analysis of functionality and financial feasibility
2. Identifying and capturing requirements of
stakeholders through customer interactions like
interviews, surveys, etc.
3. Clearly defining and documenting customer
requirements in an SRS (Software Resource
Specification Document) comprising of all product
requirements that need to be developed
4. Creating project prototypes to show the end-user
how the project will look
https://www.esds.co.in
Stage 2
Design Phase
In the design phase of an SDLC, the
architectural design is proposed for the project
based on the SRS Document requirements.
1. Separation of hardware and software
system requirements
2. Designing the system architecture
based on gathered requirements
3. Creating Unified Modelling Language
(UML) diagrams like- use cases, class
diagrams, sequence diagrams, and
activity diagrams
The Designing Phase of SDLC involves the following
https://www.esds.co.in
Stage 3
Development Phase
In the entire SDLC, the development phase is
considered to be the longest one. In this phase,
the actual project is developed and built.
1. Actual code is written
2. Demonstration of accomplished work
presented before a Business Analyst
for further modification of work
3. Unit testing is performed, i.e.,
verifying the code based on
requirements
The Development Phase of SDLC involves the following
https://www.esds.co.in
Stage 4
Testing Phase
Almost all stages of SDLC involves the
testing strategy. However, SDLC’s testing
phase refers to checking, reporting, and
fixing the system for any bug/defect. In
this phase, the on-going system or project
is migrated to a test environment where
different testing forms are performed. This
testing continues until the project has
achieved the quality standards, as
mentioned in the SRS document during
the requirement gathering phase.
The Testing Phase involves the following-
1. Testing the system as a whole
2. Performing different types of test in the
system
3. Reporting and fixing all forms of bugs &
defects
https://www.esds.co.in
Stage 4
Deployment &
Maintenance Phase
In this SDLC phase, once the system
testing has been done, it is ready to be
launched. The system may be initially
released for limited users by testing it in
a real business environment for UAT or
User Acceptance Testing.
1. The system is ready for delivery
2. The system is installed and used
3. Errors are rectified that might have
been previously missed
4. Enhancing the system inside a data
center
The Deployment & Maintenance Phase
involves the following-
https://www.esds.co.in
https://www.esds.co.in
Various SDLC models are defined and designed to
follow the software development process.
These models are also known as Software
Development Process Models. Each of these
models follows a series of steps for ensuring the
complete success of a project.
SDLC Models
Some of the most popular SDLC
models used for software
development include
Iterative-
Incremental
Model
Spiral
Model
Rapid Action
Development
(RAD) Model
Waterfall
Model
Agile
Model
https://www.esds.co.in
Waterfall Model
This model is the most commonly used SDLC model. In this model,
each phase starts only after the previous step has been completed.
This is a linear model having no feedback loops.
https://www.esds.co.in
Waterfall Model
Requirement
Analysis
Design
Coding
Software
Product
https://www.esds.co.in
Strengths of the
Waterfall Model
Works well when the
project Quality is
important
Easy to Understand
and Use
Achievements are
well-defined
Defines
requirements
stability
Weaknesses of the
Waterfall Model
Testing begins only after
the development phase
is complete
It cannot match
reality well
Difficult to
make changes
Software delivered
towards the end of the
project only
https://www.esds.co.in
Iterative-
Incremental Model
In this model, in the initial stages, a partial
implementation of the complete system is
constructed such that it will be present in a
deliverable form. Increased functionalities are
added and for any defects, they are fixed with the
working product delivered at the end. This
process is repeated until the product development
cycle gets completed. These repetitions of
processes are known as iterations. With each
iteration, a product increment gets delivered.
https://www.esds.co.in
Iterative-Incremental Model
https://www.esds.co.in
Strengths of the
Iterative-
Incremental
Model
Changes in
requirements can be
easily adjusted
The initial delivery of
the product is faster
Prioritized
requirements can
be initially
developed
Lower initial
delivery costs
Weaknesses of
the Iterative-
Incremental
Model
Clear module interfaces
are required
There are
requirements for
effective iterations
planning
Efficient design is
required for including
the required
functionalities
An early definition of a complete, as well
as fully functional system, is needed for
allowing increments definition
https://www.esds.co.in
Spiral Model
The spiral model combines risk analysis
along with RAD prototyping to the Waterfall
model. Each of the cycles has the same steps
as in the case of the Waterfall model.
https://www.esds.co.in
Spiral Model
https://www.esds.co.in
Strengths of the
Spiral Model
Critical & high-risk
functionalities are
initially developed
Users are involved in
all lifecycle stages
Users can have
a look at their
system early
due to rapid
prototyping
tools
An early indication of the risks can be
provided, without incurring much cost
Weaknesses of
the Spiral
Model
Time spent on addressing
risks can be large for
smaller & low-risk
involved projects
The spiral may go on
indefinitely
The spiral model can be
complex to understand
for new members
It may be hard to set the objectives, verifiable
milestones for indicating preparedness to go
ahead with the next iteration
https://www.esds.co.in
Agile Model
The agile model is the combination of the
iterative-incremental model that depends on
process adaptability along with customer
satisfaction through the delivery of software
products. In this model, the project is
broken down into smaller time frames for
delivering certain features during a release.
https://www.esds.co.in
Agile Model
https://www.esds.co.in
Strengths of the
Agile Model
Functionalities can be
developed quickly and
demonstrated to customers
Regular communication takes place
between customers and developers
Easy to
accommodate
changing
requirements
Weaknesses
of the Agile
Model
Teams need to have the
desired experience levels
for adhering method rules
Not ideal for
handling complex
dependencies
https://www.esds.co.in
Rapid Application
Development (RAD) Model
The RAD SDLC model is based on
prototyping and iterative development, with
no involvement of a defined planning
structure. In this model, different function
modules are parallelly developed as
prototypes and then integrated to speed up
product delivery.
https://www.esds.co.in
Rapid Application Development (RAD) Model
https://www.esds.co.in
Strengths of RAD
Model
Customer’s continuous involvement
ensures minimal risks of not
achieving customer satisfaction
Reduced cycle time and enhanced
productivity with minimal team members
Easy to
accommodate
any user
changes
Weaknesses
of RAD
Model
Heavily dependent on technically
strong members for identifying
business requirements
Hard to use and
implement with
legacy systems
https://www.esds.co.in
Thank You
https://www.esds.co.in

More Related Content

What's hot

Rapid application development
Rapid application developmentRapid application development
Rapid application developmentLombe Kapaya
 
Rad model
Rad modelRad model
Rad modelZeal
 
+Software development methodologies
+Software development methodologies+Software development methodologies
+Software development methodologieswalid sassi
 
Rapid application development
Rapid application developmentRapid application development
Rapid application developmentDhruvSamant1
 
Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsCAST
 
Six steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsSix steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsCAST
 
What is Rapid Application Development
What is Rapid Application DevelopmentWhat is Rapid Application Development
What is Rapid Application DevelopmentOutSystems
 
Enterprise Java Platform Migration Assessment
Enterprise Java Platform Migration AssessmentEnterprise Java Platform Migration Assessment
Enterprise Java Platform Migration AssessmentC2B2 Consulting
 
SE2018_Lec-22_-Continuous-Integration-Tools
SE2018_Lec-22_-Continuous-Integration-ToolsSE2018_Lec-22_-Continuous-Integration-Tools
SE2018_Lec-22_-Continuous-Integration-ToolsAmr E. Mohamed
 
End-To-End Visual Studio Application Lifecycle Management
End-To-End Visual Studio Application Lifecycle ManagementEnd-To-End Visual Studio Application Lifecycle Management
End-To-End Visual Studio Application Lifecycle ManagementHosam Kamel
 
FY17 ADM Suites Quick Sheets
FY17 ADM Suites Quick SheetsFY17 ADM Suites Quick Sheets
FY17 ADM Suites Quick SheetsW. Brady Pedigo
 
Empirical Study of Software Development Life Cycle and its Various Models
Empirical Study of Software Development Life Cycle and its Various ModelsEmpirical Study of Software Development Life Cycle and its Various Models
Empirical Study of Software Development Life Cycle and its Various ModelsCSCJournals
 
Mridul_Mandal_Resume_5+yrs_QA
Mridul_Mandal_Resume_5+yrs_QAMridul_Mandal_Resume_5+yrs_QA
Mridul_Mandal_Resume_5+yrs_QAMridul Mandal
 
Comp8 unit5 lecture_slides
Comp8 unit5 lecture_slidesComp8 unit5 lecture_slides
Comp8 unit5 lecture_slidesCMDLMS
 

What's hot (20)

Waterfall Model By Zubair YaSeeN
Waterfall Model By Zubair YaSeeN  Waterfall Model By Zubair YaSeeN
Waterfall Model By Zubair YaSeeN
 
Rapid application development
Rapid application developmentRapid application development
Rapid application development
 
Rad model
Rad modelRad model
Rad model
 
+Software development methodologies
+Software development methodologies+Software development methodologies
+Software development methodologies
 
Rapid application development
Rapid application developmentRapid application development
Rapid application development
 
SDLC, Iterative Model
SDLC, Iterative ModelSDLC, Iterative Model
SDLC, Iterative Model
 
Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical Systems
 
Resume
ResumeResume
Resume
 
Six steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsSix steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systems
 
What is Rapid Application Development
What is Rapid Application DevelopmentWhat is Rapid Application Development
What is Rapid Application Development
 
Enterprise Java Platform Migration Assessment
Enterprise Java Platform Migration AssessmentEnterprise Java Platform Migration Assessment
Enterprise Java Platform Migration Assessment
 
SE2018_Lec-22_-Continuous-Integration-Tools
SE2018_Lec-22_-Continuous-Integration-ToolsSE2018_Lec-22_-Continuous-Integration-Tools
SE2018_Lec-22_-Continuous-Integration-Tools
 
End-To-End Visual Studio Application Lifecycle Management
End-To-End Visual Studio Application Lifecycle ManagementEnd-To-End Visual Studio Application Lifecycle Management
End-To-End Visual Studio Application Lifecycle Management
 
FY17 ADM Suites Quick Sheets
FY17 ADM Suites Quick SheetsFY17 ADM Suites Quick Sheets
FY17 ADM Suites Quick Sheets
 
SDLC Model by MHM
SDLC Model by MHMSDLC Model by MHM
SDLC Model by MHM
 
Empirical Study of Software Development Life Cycle and its Various Models
Empirical Study of Software Development Life Cycle and its Various ModelsEmpirical Study of Software Development Life Cycle and its Various Models
Empirical Study of Software Development Life Cycle and its Various Models
 
Mridul_Mandal_Resume_5+yrs_QA
Mridul_Mandal_Resume_5+yrs_QAMridul_Mandal_Resume_5+yrs_QA
Mridul_Mandal_Resume_5+yrs_QA
 
Comp8 unit5 lecture_slides
Comp8 unit5 lecture_slidesComp8 unit5 lecture_slides
Comp8 unit5 lecture_slides
 
Kishore_Kandavalli_Resume
Kishore_Kandavalli_ResumeKishore_Kandavalli_Resume
Kishore_Kandavalli_Resume
 
RAD Model
RAD ModelRAD Model
RAD Model
 

Similar to Introduction to Software Development Life Cycle: Phases & Models

REPORT IN SYSTEM INTEGRATION AND ARCHITECTURE.pptx
REPORT IN SYSTEM INTEGRATION AND ARCHITECTURE.pptxREPORT IN SYSTEM INTEGRATION AND ARCHITECTURE.pptx
REPORT IN SYSTEM INTEGRATION AND ARCHITECTURE.pptxESAChannel
 
SDLC Models and Their Implementation
SDLC Models and Their ImplementationSDLC Models and Their Implementation
SDLC Models and Their ImplementationSonal Tiwari
 
Sdlc overview
Sdlc overviewSdlc overview
Sdlc overviewheripra
 
Lesson 2 introduction in computing
Lesson 2 introduction in computingLesson 2 introduction in computing
Lesson 2 introduction in computingProfessor Thor
 
software development life cycle(SDLC)
software development life cycle(SDLC)software development life cycle(SDLC)
software development life cycle(SDLC)sanoop s
 
S.D.L.C (Software Development Life Cycle.)
S.D.L.C (Software Development Life Cycle.)S.D.L.C (Software Development Life Cycle.)
S.D.L.C (Software Development Life Cycle.)Jayesh Buwa
 
(Software development-life-cycle)
(Software  development-life-cycle)(Software  development-life-cycle)
(Software development-life-cycle)Abdullah Al Rumy
 
SDLC - Software Development Life Cycle
SDLC - Software Development Life CycleSDLC - Software Development Life Cycle
SDLC - Software Development Life CycleSaravanan Manoharan
 
Waterfall Model (Software Engineering)
Waterfall Model (Software Engineering)  Waterfall Model (Software Engineering)
Waterfall Model (Software Engineering) MuhammadTalha436
 
Essence of waterfall_model
Essence of waterfall_modelEssence of waterfall_model
Essence of waterfall_modelwanda31
 
Software Development Life Cycle Model
Software Development Life Cycle ModelSoftware Development Life Cycle Model
Software Development Life Cycle ModelJ.T.A.JONES
 
Software development process basic
Software development process basicSoftware development process basic
Software development process basicAnurag Tomar
 

Similar to Introduction to Software Development Life Cycle: Phases & Models (20)

REPORT IN SYSTEM INTEGRATION AND ARCHITECTURE.pptx
REPORT IN SYSTEM INTEGRATION AND ARCHITECTURE.pptxREPORT IN SYSTEM INTEGRATION AND ARCHITECTURE.pptx
REPORT IN SYSTEM INTEGRATION AND ARCHITECTURE.pptx
 
Sdlc
SdlcSdlc
Sdlc
 
SDLC Models and Their Implementation
SDLC Models and Their ImplementationSDLC Models and Their Implementation
SDLC Models and Their Implementation
 
Sdlc overview
Sdlc overviewSdlc overview
Sdlc overview
 
Lesson 2 introduction in computing
Lesson 2 introduction in computingLesson 2 introduction in computing
Lesson 2 introduction in computing
 
software development life cycle(SDLC)
software development life cycle(SDLC)software development life cycle(SDLC)
software development life cycle(SDLC)
 
SDLC
SDLCSDLC
SDLC
 
S.D.L.C (Software Development Life Cycle.)
S.D.L.C (Software Development Life Cycle.)S.D.L.C (Software Development Life Cycle.)
S.D.L.C (Software Development Life Cycle.)
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)
 
(Software development-life-cycle)
(Software  development-life-cycle)(Software  development-life-cycle)
(Software development-life-cycle)
 
SDLC Models
SDLC ModelsSDLC Models
SDLC Models
 
Software Development Life Cycle Part II
Software Development Life Cycle Part IISoftware Development Life Cycle Part II
Software Development Life Cycle Part II
 
SDLC - Software Development Life Cycle
SDLC - Software Development Life CycleSDLC - Software Development Life Cycle
SDLC - Software Development Life Cycle
 
Waterfall Model (Software Engineering)
Waterfall Model (Software Engineering)  Waterfall Model (Software Engineering)
Waterfall Model (Software Engineering)
 
Essence of waterfall_model
Essence of waterfall_modelEssence of waterfall_model
Essence of waterfall_model
 
SDLC.pptx
SDLC.pptxSDLC.pptx
SDLC.pptx
 
Sdlc
SdlcSdlc
Sdlc
 
Software Development Life Cycle Model
Software Development Life Cycle ModelSoftware Development Life Cycle Model
Software Development Life Cycle Model
 
Software development process basic
Software development process basicSoftware development process basic
Software development process basic
 
Incremental model
Incremental modelIncremental model
Incremental model
 

More from manoharparakh

Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...manoharparakh
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...manoharparakh
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfmanoharparakh
 
What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?manoharparakh
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
ESDS Community Cloud Offerings
ESDS Community Cloud OfferingsESDS Community Cloud Offerings
ESDS Community Cloud Offeringsmanoharparakh
 
Cloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks FutureproofCloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks Futureproofmanoharparakh
 
Considering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdfConsidering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdfmanoharparakh
 
Email Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating EmailEmail Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating Emailmanoharparakh
 
Key Technologies for Autonomous Driving
Key Technologies for Autonomous DrivingKey Technologies for Autonomous Driving
Key Technologies for Autonomous Drivingmanoharparakh
 
Key Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous DrivingKey Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous Drivingmanoharparakh
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Securitymanoharparakh
 
Understanding WhatData Center Security Is
Understanding WhatData Center Security IsUnderstanding WhatData Center Security Is
Understanding WhatData Center Security Ismanoharparakh
 
eNlightBot : AI Enabled Chatbot Platform
eNlightBot : AI Enabled Chatbot PlatformeNlightBot : AI Enabled Chatbot Platform
eNlightBot : AI Enabled Chatbot Platformmanoharparakh
 
SOC Services- Enhancing Organization's Cyber & Digital Security Posture
SOC Services- Enhancing Organization's Cyber & Digital Security PostureSOC Services- Enhancing Organization's Cyber & Digital Security Posture
SOC Services- Enhancing Organization's Cyber & Digital Security Posturemanoharparakh
 
Debunking common cloud hosting myths
Debunking common cloud hosting mythsDebunking common cloud hosting myths
Debunking common cloud hosting mythsmanoharparakh
 
How is internet of things revolutionizing the healthcare landscape
How is internet of things revolutionizing the healthcare landscapeHow is internet of things revolutionizing the healthcare landscape
How is internet of things revolutionizing the healthcare landscapemanoharparakh
 

More from manoharparakh (20)

Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
 
What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
ESDS Community Cloud Offerings
ESDS Community Cloud OfferingsESDS Community Cloud Offerings
ESDS Community Cloud Offerings
 
Cloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks FutureproofCloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks Futureproof
 
Considering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdfConsidering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdf
 
Email Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating EmailEmail Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating Email
 
Cloud for startups
Cloud for startupsCloud for startups
Cloud for startups
 
Key Technologies for Autonomous Driving
Key Technologies for Autonomous DrivingKey Technologies for Autonomous Driving
Key Technologies for Autonomous Driving
 
Key Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous DrivingKey Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous Driving
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Security
 
Understanding WhatData Center Security Is
Understanding WhatData Center Security IsUnderstanding WhatData Center Security Is
Understanding WhatData Center Security Is
 
eNlightBot : AI Enabled Chatbot Platform
eNlightBot : AI Enabled Chatbot PlatformeNlightBot : AI Enabled Chatbot Platform
eNlightBot : AI Enabled Chatbot Platform
 
SOC Services- Enhancing Organization's Cyber & Digital Security Posture
SOC Services- Enhancing Organization's Cyber & Digital Security PostureSOC Services- Enhancing Organization's Cyber & Digital Security Posture
SOC Services- Enhancing Organization's Cyber & Digital Security Posture
 
Debunking common cloud hosting myths
Debunking common cloud hosting mythsDebunking common cloud hosting myths
Debunking common cloud hosting myths
 
How is internet of things revolutionizing the healthcare landscape
How is internet of things revolutionizing the healthcare landscapeHow is internet of things revolutionizing the healthcare landscape
How is internet of things revolutionizing the healthcare landscape
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Introduction to Software Development Life Cycle: Phases & Models

  • 1. ESDS Software Solution Pvt. Ltd. The Digital Transformation Catalyst https://www.esds.co.in
  • 2. Section BreakSection Break https://www.esds.co.in To Introduction to Software Development Life Cycle: Phases & Models
  • 3. SDLC stands for Software Development Life Cycle. It is a process that gives a complete idea about developing, designing, and maintaining a software project by ensuring that all the functionalities along with user requirements, objectives, and end goals are addressed. With SDLC, the software project’s quality and the overall software development process get enhanced. https://www.esds.co.in
  • 4. Benefits of SDLC 1. Address the goals and problems to implement the project with the highest precision and accuracy 2. SDLC does not allow the project members to proceed ahead before completion & approval of the prior stages 3. Installation in the project executed with SDLC has necessary checks to be tested with precision before entering the installation stage 4. With a well-defined SDLC in place, project members can continue the software development process without incurring any complications 5. SDLC offers optimal control with minimum problems, allowing the project members to run the project smoothly https://www.esds.co.in
  • 6. Stage 1 Requirement Gathering & Analysis Phase In an SDLC, this is the first and most crucial phase for a software project’s success. In this phase, communication takes place between stakeholders, end-users, and project teams, as both functional and non- functional requirements are gathered from customers. https://www.esds.co.in
  • 7. The Requirement Gathering & Analysis Phase of SDLC involves the following 1. Analysis of functionality and financial feasibility 2. Identifying and capturing requirements of stakeholders through customer interactions like interviews, surveys, etc. 3. Clearly defining and documenting customer requirements in an SRS (Software Resource Specification Document) comprising of all product requirements that need to be developed 4. Creating project prototypes to show the end-user how the project will look https://www.esds.co.in
  • 8. Stage 2 Design Phase In the design phase of an SDLC, the architectural design is proposed for the project based on the SRS Document requirements. 1. Separation of hardware and software system requirements 2. Designing the system architecture based on gathered requirements 3. Creating Unified Modelling Language (UML) diagrams like- use cases, class diagrams, sequence diagrams, and activity diagrams The Designing Phase of SDLC involves the following https://www.esds.co.in
  • 9. Stage 3 Development Phase In the entire SDLC, the development phase is considered to be the longest one. In this phase, the actual project is developed and built. 1. Actual code is written 2. Demonstration of accomplished work presented before a Business Analyst for further modification of work 3. Unit testing is performed, i.e., verifying the code based on requirements The Development Phase of SDLC involves the following https://www.esds.co.in
  • 10. Stage 4 Testing Phase Almost all stages of SDLC involves the testing strategy. However, SDLC’s testing phase refers to checking, reporting, and fixing the system for any bug/defect. In this phase, the on-going system or project is migrated to a test environment where different testing forms are performed. This testing continues until the project has achieved the quality standards, as mentioned in the SRS document during the requirement gathering phase. The Testing Phase involves the following- 1. Testing the system as a whole 2. Performing different types of test in the system 3. Reporting and fixing all forms of bugs & defects https://www.esds.co.in
  • 11. Stage 4 Deployment & Maintenance Phase In this SDLC phase, once the system testing has been done, it is ready to be launched. The system may be initially released for limited users by testing it in a real business environment for UAT or User Acceptance Testing. 1. The system is ready for delivery 2. The system is installed and used 3. Errors are rectified that might have been previously missed 4. Enhancing the system inside a data center The Deployment & Maintenance Phase involves the following- https://www.esds.co.in
  • 12. https://www.esds.co.in Various SDLC models are defined and designed to follow the software development process. These models are also known as Software Development Process Models. Each of these models follows a series of steps for ensuring the complete success of a project. SDLC Models
  • 13. Some of the most popular SDLC models used for software development include Iterative- Incremental Model Spiral Model Rapid Action Development (RAD) Model Waterfall Model Agile Model https://www.esds.co.in
  • 14. Waterfall Model This model is the most commonly used SDLC model. In this model, each phase starts only after the previous step has been completed. This is a linear model having no feedback loops. https://www.esds.co.in
  • 16. Strengths of the Waterfall Model Works well when the project Quality is important Easy to Understand and Use Achievements are well-defined Defines requirements stability Weaknesses of the Waterfall Model Testing begins only after the development phase is complete It cannot match reality well Difficult to make changes Software delivered towards the end of the project only https://www.esds.co.in
  • 17. Iterative- Incremental Model In this model, in the initial stages, a partial implementation of the complete system is constructed such that it will be present in a deliverable form. Increased functionalities are added and for any defects, they are fixed with the working product delivered at the end. This process is repeated until the product development cycle gets completed. These repetitions of processes are known as iterations. With each iteration, a product increment gets delivered. https://www.esds.co.in
  • 19. Strengths of the Iterative- Incremental Model Changes in requirements can be easily adjusted The initial delivery of the product is faster Prioritized requirements can be initially developed Lower initial delivery costs Weaknesses of the Iterative- Incremental Model Clear module interfaces are required There are requirements for effective iterations planning Efficient design is required for including the required functionalities An early definition of a complete, as well as fully functional system, is needed for allowing increments definition https://www.esds.co.in
  • 20. Spiral Model The spiral model combines risk analysis along with RAD prototyping to the Waterfall model. Each of the cycles has the same steps as in the case of the Waterfall model. https://www.esds.co.in
  • 22. Strengths of the Spiral Model Critical & high-risk functionalities are initially developed Users are involved in all lifecycle stages Users can have a look at their system early due to rapid prototyping tools An early indication of the risks can be provided, without incurring much cost Weaknesses of the Spiral Model Time spent on addressing risks can be large for smaller & low-risk involved projects The spiral may go on indefinitely The spiral model can be complex to understand for new members It may be hard to set the objectives, verifiable milestones for indicating preparedness to go ahead with the next iteration https://www.esds.co.in
  • 23. Agile Model The agile model is the combination of the iterative-incremental model that depends on process adaptability along with customer satisfaction through the delivery of software products. In this model, the project is broken down into smaller time frames for delivering certain features during a release. https://www.esds.co.in
  • 25. Strengths of the Agile Model Functionalities can be developed quickly and demonstrated to customers Regular communication takes place between customers and developers Easy to accommodate changing requirements Weaknesses of the Agile Model Teams need to have the desired experience levels for adhering method rules Not ideal for handling complex dependencies https://www.esds.co.in
  • 26. Rapid Application Development (RAD) Model The RAD SDLC model is based on prototyping and iterative development, with no involvement of a defined planning structure. In this model, different function modules are parallelly developed as prototypes and then integrated to speed up product delivery. https://www.esds.co.in
  • 27. Rapid Application Development (RAD) Model https://www.esds.co.in
  • 28. Strengths of RAD Model Customer’s continuous involvement ensures minimal risks of not achieving customer satisfaction Reduced cycle time and enhanced productivity with minimal team members Easy to accommodate any user changes Weaknesses of RAD Model Heavily dependent on technically strong members for identifying business requirements Hard to use and implement with legacy systems https://www.esds.co.in