SlideShare a Scribd company logo
1 of 17
Configuration Management
Lecture VII
IET-3017 : Software Engineering
Asad Javed
Configuration Management
When we develop software, the product
(software) undergoes many changes in their
maintenance phase; we need to handle these
changes effectively.
Several individuals (programs) works together
to achieve these common goals.
2
The elements that comprise all information
produced as a part of the software process
are collectively called a software
configuration.
A configuration of the product refers not only
to the product's constituent but also to a
particular version of the component.
3
Cont…
Identify change
Monitor and control change
Ensure the proper implementation of change
made to the item.
Auditing and reporting on the change made.
Configuration Management (CM) is a technic
of identifying, organizing, and controlling
modification to software being built by a
programming team.
4
Why configuration Management
Multiple people are working on software
which is consistently updating.
It may be a method where multiple version,
branches, authors are involved in a software
project, and the team is geographically
distributed and works concurrently. It
changes in user requirements, and policy,
budget, schedules need to be
accommodated.
5
Importance of SCM
It is practical in controlling and managing the
access.
e.g., by preventing the two members of a
team for checking out the same component
for modification at the same time.
6
Cont…
It provides the tool to ensure that changes
are being properly implemented.
SCM is used in keeping a system in a
consistent state by automatically producing
derived version upon modification of the
same component
7
Process involved in SCM
Configuration management provides a
disciplined environment for smooth control of
work products. It involves the following
activities:
Identification and Establishment
Version Control
Change Control
Configuration Auditing
Reporting
8
Identification and Establishment
Identifying the configuration items from
products that compose baselines at given
points in time (a baseline is a set of mutually
consistent Configuration Items, which has
been formally reviewed and agreed upon,
and serves as the basis of further
development).
9
Version Control
Creating versions/specifications of the
existing product to build new products from
the help of SCM system. A description of
version is given below:
10
Cont…
Suppose after some changes, the version of
configuration object changes from 1.0 to 1.1.
Minor corrections and changes result in
versions 1.1.1 and 1.1.2, which is followed by
a major update that is object 1.2.
11
Change control
Controlling changes to Configuration items
(CI).
A change request (CR) is submitted and
evaluated to assess technical merit, potential
side effects, overall impact on other
configuration objects and system functions,
and the projected cost of the change
12
Cont…
The object to be changed is “checked out” of
the project database, the change is made,
and then the object is tested again. The
object is then “checked in” to the database
and appropriate version control mechanisms
are used to create the next version of the
software.
13
Configuration Auditing
A software configuration audit complements
the formal technical review of the process
and product. It focuses on the technical
correctness of the configuration object that
has been modified. The audit confirms the
completeness, correctness and consistency of
items in the SCM system and track action
items from the audit to closure.
14
Reporting
Providing accurate status and current
configuration data to developers, tester, end
users, customers and stakeholders through
admin guides, user guides, FAQs, Release
notes, Memos, Installation Guide,
Configuration guide etc
15
Advantages of SCM
Improved productivity and efficiency by
reducing the time and effort required to
manage software changes.
Reduced risk of errors and defects by
ensuring that all changes are properly tested
and validated.
Improved quality and stability of software
systems by ensuring that all changes are
properly controlled and managed.
16
Disadvantages of SCM
Increased complexity and overhead,
particularly in large software systems.
Difficulty in managing dependencies and
ensuring that all changes are properly
integrated.
17

More Related Content

Similar to SE Lecture 7.ppt

Software configuration management
Software configuration managementSoftware configuration management
Software configuration managementfizamustanser
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration managementlokareminakshi
 
10 software maintenance
10 software maintenance10 software maintenance
10 software maintenanceakiara
 
SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)Amr E. Mohamed
 
SE Sumerville 9th Chp 2
SE Sumerville 9th Chp 2SE Sumerville 9th Chp 2
SE Sumerville 9th Chp 2Kashif Sohail
 
Ch 2 Software Engineering
Ch 2 Software EngineeringCh 2 Software Engineering
Ch 2 Software EngineeringImran Mirza
 
SOFTWARE ENGINEERING PART 1
SOFTWARE ENGINEERING PART 1SOFTWARE ENGINEERING PART 1
SOFTWARE ENGINEERING PART 1ravi gupta
 
SE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration ManagementSE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration ManagementAmr E. Mohamed
 
Ian Sommerville, Software Engineering, 9th Edition Ch2
Ian Sommerville,  Software Engineering, 9th Edition Ch2Ian Sommerville,  Software Engineering, 9th Edition Ch2
Ian Sommerville, Software Engineering, 9th Edition Ch2Mohammed Romi
 
Lecture - 7-10.pptx
Lecture - 7-10.pptxLecture - 7-10.pptx
Lecture - 7-10.pptxFarHana74914
 
Bridge Process Model
Bridge Process ModelBridge Process Model
Bridge Process ModelStephen Raj
 
BSG SE4201 Software Configuration Management and Maintenance Lesson 1 Novembe...
BSG SE4201 Software Configuration Management and Maintenance Lesson 1 Novembe...BSG SE4201 Software Configuration Management and Maintenance Lesson 1 Novembe...
BSG SE4201 Software Configuration Management and Maintenance Lesson 1 Novembe...ZaharaddeenAbubuakar
 
Sofware engineering
Sofware engineeringSofware engineering
Sofware engineeringnstjelja
 

Similar to SE Lecture 7.ppt (20)

Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 
Ch25
Ch25Ch25
Ch25
 
10 software maintenance
10 software maintenance10 software maintenance
10 software maintenance
 
SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)SE2018_Lec 21_ Software Configuration Management (SCM)
SE2018_Lec 21_ Software Configuration Management (SCM)
 
SE Sumerville 9th Chp 2
SE Sumerville 9th Chp 2SE Sumerville 9th Chp 2
SE Sumerville 9th Chp 2
 
Ch2
Ch2Ch2
Ch2
 
Ch 2 Software Engineering
Ch 2 Software EngineeringCh 2 Software Engineering
Ch 2 Software Engineering
 
SOFTWARE ENGINEERING PART 1
SOFTWARE ENGINEERING PART 1SOFTWARE ENGINEERING PART 1
SOFTWARE ENGINEERING PART 1
 
5. scm
5. scm5. scm
5. scm
 
SE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration ManagementSE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration Management
 
Software process
Software processSoftware process
Software process
 
Ch2-2.pptx
Ch2-2.pptxCh2-2.pptx
Ch2-2.pptx
 
Ian Sommerville, Software Engineering, 9th Edition Ch2
Ian Sommerville,  Software Engineering, 9th Edition Ch2Ian Sommerville,  Software Engineering, 9th Edition Ch2
Ian Sommerville, Software Engineering, 9th Edition Ch2
 
Lecture - 7-10.pptx
Lecture - 7-10.pptxLecture - 7-10.pptx
Lecture - 7-10.pptx
 
Bridge Process Model
Bridge Process ModelBridge Process Model
Bridge Process Model
 
BSG SE4201 Software Configuration Management and Maintenance Lesson 1 Novembe...
BSG SE4201 Software Configuration Management and Maintenance Lesson 1 Novembe...BSG SE4201 Software Configuration Management and Maintenance Lesson 1 Novembe...
BSG SE4201 Software Configuration Management and Maintenance Lesson 1 Novembe...
 
SE-Lecture-8.pptx
SE-Lecture-8.pptxSE-Lecture-8.pptx
SE-Lecture-8.pptx
 
Sofware engineering
Sofware engineeringSofware engineering
Sofware engineering
 
Software maintenance
Software maintenanceSoftware maintenance
Software maintenance
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

SE Lecture 7.ppt

  • 1. Configuration Management Lecture VII IET-3017 : Software Engineering Asad Javed
  • 2. Configuration Management When we develop software, the product (software) undergoes many changes in their maintenance phase; we need to handle these changes effectively. Several individuals (programs) works together to achieve these common goals. 2
  • 3. The elements that comprise all information produced as a part of the software process are collectively called a software configuration. A configuration of the product refers not only to the product's constituent but also to a particular version of the component. 3
  • 4. Cont… Identify change Monitor and control change Ensure the proper implementation of change made to the item. Auditing and reporting on the change made. Configuration Management (CM) is a technic of identifying, organizing, and controlling modification to software being built by a programming team. 4
  • 5. Why configuration Management Multiple people are working on software which is consistently updating. It may be a method where multiple version, branches, authors are involved in a software project, and the team is geographically distributed and works concurrently. It changes in user requirements, and policy, budget, schedules need to be accommodated. 5
  • 6. Importance of SCM It is practical in controlling and managing the access. e.g., by preventing the two members of a team for checking out the same component for modification at the same time. 6
  • 7. Cont… It provides the tool to ensure that changes are being properly implemented. SCM is used in keeping a system in a consistent state by automatically producing derived version upon modification of the same component 7
  • 8. Process involved in SCM Configuration management provides a disciplined environment for smooth control of work products. It involves the following activities: Identification and Establishment Version Control Change Control Configuration Auditing Reporting 8
  • 9. Identification and Establishment Identifying the configuration items from products that compose baselines at given points in time (a baseline is a set of mutually consistent Configuration Items, which has been formally reviewed and agreed upon, and serves as the basis of further development). 9
  • 10. Version Control Creating versions/specifications of the existing product to build new products from the help of SCM system. A description of version is given below: 10
  • 11. Cont… Suppose after some changes, the version of configuration object changes from 1.0 to 1.1. Minor corrections and changes result in versions 1.1.1 and 1.1.2, which is followed by a major update that is object 1.2. 11
  • 12. Change control Controlling changes to Configuration items (CI). A change request (CR) is submitted and evaluated to assess technical merit, potential side effects, overall impact on other configuration objects and system functions, and the projected cost of the change 12
  • 13. Cont… The object to be changed is “checked out” of the project database, the change is made, and then the object is tested again. The object is then “checked in” to the database and appropriate version control mechanisms are used to create the next version of the software. 13
  • 14. Configuration Auditing A software configuration audit complements the formal technical review of the process and product. It focuses on the technical correctness of the configuration object that has been modified. The audit confirms the completeness, correctness and consistency of items in the SCM system and track action items from the audit to closure. 14
  • 15. Reporting Providing accurate status and current configuration data to developers, tester, end users, customers and stakeholders through admin guides, user guides, FAQs, Release notes, Memos, Installation Guide, Configuration guide etc 15
  • 16. Advantages of SCM Improved productivity and efficiency by reducing the time and effort required to manage software changes. Reduced risk of errors and defects by ensuring that all changes are properly tested and validated. Improved quality and stability of software systems by ensuring that all changes are properly controlled and managed. 16
  • 17. Disadvantages of SCM Increased complexity and overhead, particularly in large software systems. Difficulty in managing dependencies and ensuring that all changes are properly integrated. 17