SlideShare a Scribd company logo
Chapter 8 Analysis Engineering Software Engineering: A Practitioner’s Approach by Roger S. Pressman
Analysis Model Elements of the analysis model
Scenario-Based Modeling
Use-case Diagram Use-case diagram for surveillance function
Alternative Actions ,[object Object],[object Object],[object Object]
Activity diagram  for Access camera surveillance—display camera views function
Swimlane diagram
Flow-Oriented Modeling
Guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Flow Diagram Context-level DFD for  SafeHome  security function
Grammatical Parse ,[object Object],[object Object],[object Object],[object Object]
 
Level 2 DFD that refines the monitor sensors process
Control Flow Diagram State diagram for  SafeHome  security function
Class-Based Modeling
Identifying Analysis Classes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Class Selection Criteria ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identifying Classes reject: 1, 2 fail organizational unit; ee monitoring service accept: 1 fails external entity audible alarm accept occurrence sensor event reject: 3 fails thing telephone number reject: 3 fails thing master password reject: 3 fails not objects, attributes number, type accept thing (security) system reject occurrence installation accept external entity control panel accept external entity sensor reject: 1, 2 fail role; external entity homeowner Accept / Reject Classification Potential class
Class Diagram Class diagram for the system class
Class Diagram Class diagram for FloorPlan
CRC Modeling A CRC model index card for FloorPlan class
Class Responsibilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Class Collaborations ,[object Object],[object Object],[object Object],[object Object]
Class Diagrams Top: Multiplicity Bottom: Dependencies
Behavioral Modeling
Identifying Events ,[object Object],[object Object]
State Diagram State diagram for the ControlPanel class
Sequence Diagram Sequence diagram (partial) for the  SafeHome  security function

More Related Content

What's hot

Context model
Context modelContext model
Context model
Ubaid423
 
Project control and process instrumentation
Project control and process instrumentationProject control and process instrumentation
Project control and process instrumentation
Kuppusamy P
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
gaurav jain
 
Software requirements specification of Library Management System
Software requirements specification of Library Management SystemSoftware requirements specification of Library Management System
Software requirements specification of Library Management System
Soumili Sen
 
SLA Agreement, types and Life Cycle
SLA Agreement, types and Life Cycle SLA Agreement, types and Life Cycle
SLA Agreement, types and Life Cycle
Dr Neelesh Jain
 
Grasp patterns and its types
Grasp patterns and its typesGrasp patterns and its types
Grasp patterns and its types
Syed Hassan Ali
 
Interaction Modeling
Interaction ModelingInteraction Modeling
Interaction Modeling
Hemant Sharma
 
online examination management system
online examination management systemonline examination management system
online examination management system
Praveen Patel
 
Process Management-Process Migration
Process Management-Process MigrationProcess Management-Process Migration
Process Management-Process Migration
MNM Jain Engineering College
 
Collaboration diagram- UML diagram
Collaboration diagram- UML diagram Collaboration diagram- UML diagram
Collaboration diagram- UML diagram
Ramakant Soni
 
Srs for banking system
Srs for banking systemSrs for banking system
Srs for banking system
Jaydev Kishnani
 
Software Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management SystemSoftware Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management System
Uttam Singh Chaudhary
 
CS6502 OOAD - Question Bank and Answer
CS6502 OOAD - Question Bank and AnswerCS6502 OOAD - Question Bank and Answer
CS6502 OOAD - Question Bank and Answer
Gobinath Subramaniam
 
Software Process Improvement
Software Process ImprovementSoftware Process Improvement
Software Process Improvement
Bilal Shah
 
Data Designs (Software Engg.)
Data Designs (Software Engg.)Data Designs (Software Engg.)
Data Designs (Software Engg.)
Arun Shukla
 
Hierarchical models of software quality
Hierarchical models of software qualityHierarchical models of software quality
Hierarchical models of software quality
MuthuKumaran Singaravelu
 
Software Engineering (Project Scheduling)
Software Engineering (Project Scheduling)Software Engineering (Project Scheduling)
Software Engineering (Project Scheduling)
ShudipPal
 
Online examination system
Online examination systemOnline examination system
Online examination system
Mr. Vikram Singh Slathia
 
Online Food Ordering System
Online Food Ordering SystemOnline Food Ordering System
Online Food Ordering System
Ankita Jangir
 

What's hot (20)

Context model
Context modelContext model
Context model
 
Project control and process instrumentation
Project control and process instrumentationProject control and process instrumentation
Project control and process instrumentation
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
Software requirements specification of Library Management System
Software requirements specification of Library Management SystemSoftware requirements specification of Library Management System
Software requirements specification of Library Management System
 
SLA Agreement, types and Life Cycle
SLA Agreement, types and Life Cycle SLA Agreement, types and Life Cycle
SLA Agreement, types and Life Cycle
 
Software Metrics
Software MetricsSoftware Metrics
Software Metrics
 
Grasp patterns and its types
Grasp patterns and its typesGrasp patterns and its types
Grasp patterns and its types
 
Interaction Modeling
Interaction ModelingInteraction Modeling
Interaction Modeling
 
online examination management system
online examination management systemonline examination management system
online examination management system
 
Process Management-Process Migration
Process Management-Process MigrationProcess Management-Process Migration
Process Management-Process Migration
 
Collaboration diagram- UML diagram
Collaboration diagram- UML diagram Collaboration diagram- UML diagram
Collaboration diagram- UML diagram
 
Srs for banking system
Srs for banking systemSrs for banking system
Srs for banking system
 
Software Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management SystemSoftware Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management System
 
CS6502 OOAD - Question Bank and Answer
CS6502 OOAD - Question Bank and AnswerCS6502 OOAD - Question Bank and Answer
CS6502 OOAD - Question Bank and Answer
 
Software Process Improvement
Software Process ImprovementSoftware Process Improvement
Software Process Improvement
 
Data Designs (Software Engg.)
Data Designs (Software Engg.)Data Designs (Software Engg.)
Data Designs (Software Engg.)
 
Hierarchical models of software quality
Hierarchical models of software qualityHierarchical models of software quality
Hierarchical models of software quality
 
Software Engineering (Project Scheduling)
Software Engineering (Project Scheduling)Software Engineering (Project Scheduling)
Software Engineering (Project Scheduling)
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
Online Food Ordering System
Online Food Ordering SystemOnline Food Ordering System
Online Food Ordering System
 

Viewers also liked

4. UML
4. UML4. UML
Slides chapter 9
Slides chapter 9Slides chapter 9
Slides chapter 9
Priyanka Shetty
 
Surveillance System (Minimum Vertex Cover Problem)
Surveillance System (Minimum Vertex Cover Problem) Surveillance System (Minimum Vertex Cover Problem)
Surveillance System (Minimum Vertex Cover Problem)
Saksham Saxena
 
Home appliances control system
Home appliances control systemHome appliances control system
Home appliances control system
Sundas Kayani
 
Slides chapter 11
Slides chapter 11Slides chapter 11
Slides chapter 11
Priyanka Shetty
 
Slides chapters 24-25
Slides chapters 24-25Slides chapters 24-25
Slides chapters 24-25
Priyanka Shetty
 
Lecture 14 requirements modeling - flow and behavior
Lecture 14   requirements modeling - flow and  behaviorLecture 14   requirements modeling - flow and  behavior
Lecture 14 requirements modeling - flow and behavior
IIUI
 
Slides chapter 10
Slides chapter 10Slides chapter 10
Slides chapter 10
Priyanka Shetty
 
Slides chapters 6-7
Slides chapters 6-7Slides chapters 6-7
Slides chapters 6-7
Priyanka Shetty
 
Unit 3 3 architectural design
Unit 3 3 architectural designUnit 3 3 architectural design
Unit 3 3 architectural designHiren Selani
 
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
mohamed khalaf alla mohamedain
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing Basics
Belal Raslan
 
Study for big data analysis design model
Study for big data analysis design modelStudy for big data analysis design model
Study for big data analysis design model
Joon ho Park
 
Chapter 08
Chapter 08Chapter 08
Chapter 08guru3188
 
Bilgi Sistemleri - Ders 3
Bilgi Sistemleri - Ders 3Bilgi Sistemleri - Ders 3
Bilgi Sistemleri - Ders 3guest0296675
 
software Ch01
software Ch01software Ch01
software Ch01liincn
 

Viewers also liked (20)

4. UML
4. UML4. UML
4. UML
 
Slides chapter 9
Slides chapter 9Slides chapter 9
Slides chapter 9
 
Surveillance System (Minimum Vertex Cover Problem)
Surveillance System (Minimum Vertex Cover Problem) Surveillance System (Minimum Vertex Cover Problem)
Surveillance System (Minimum Vertex Cover Problem)
 
Home appliances control system
Home appliances control systemHome appliances control system
Home appliances control system
 
Slides chapter 11
Slides chapter 11Slides chapter 11
Slides chapter 11
 
Slides chapter 5
Slides chapter 5Slides chapter 5
Slides chapter 5
 
Slides chapters 24-25
Slides chapters 24-25Slides chapters 24-25
Slides chapters 24-25
 
Lecture 14 requirements modeling - flow and behavior
Lecture 14   requirements modeling - flow and  behaviorLecture 14   requirements modeling - flow and  behavior
Lecture 14 requirements modeling - flow and behavior
 
Slides chapter 10
Slides chapter 10Slides chapter 10
Slides chapter 10
 
Slides chapters 6-7
Slides chapters 6-7Slides chapters 6-7
Slides chapters 6-7
 
Unit 3 3 architectural design
Unit 3 3 architectural designUnit 3 3 architectural design
Unit 3 3 architectural design
 
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing Basics
 
Ch08
Ch08Ch08
Ch08
 
Study for big data analysis design model
Study for big data analysis design modelStudy for big data analysis design model
Study for big data analysis design model
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter05
Chapter05Chapter05
Chapter05
 
Chapter06
Chapter06Chapter06
Chapter06
 
Bilgi Sistemleri - Ders 3
Bilgi Sistemleri - Ders 3Bilgi Sistemleri - Ders 3
Bilgi Sistemleri - Ders 3
 
software Ch01
software Ch01software Ch01
software Ch01
 

Similar to Slides chapter 8

Software engg. pressman_ch-8
Software engg. pressman_ch-8Software engg. pressman_ch-8
Software engg. pressman_ch-8Dhairya Joshi
 
lecture_18class_diagrams.ppt
lecture_18class_diagrams.pptlecture_18class_diagrams.ppt
lecture_18class_diagrams.ppt
23017156038
 
Class based modeling
Class based modelingClass based modeling
Class based modeling
Md. Shafiuzzaman Hira
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponse
Ertugrul Akbas
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer Overview
Scott Suhy
 
Data flow diagram
Data flow diagramData flow diagram
Data flow diagram
Muhammad Wajahat Bajwa
 
Darktrace_Threat_Visualizer_User_Guide.pdf
Darktrace_Threat_Visualizer_User_Guide.pdfDarktrace_Threat_Visualizer_User_Guide.pdf
Darktrace_Threat_Visualizer_User_Guide.pdf
LeninHernnCortsLlang
 
Lecture 11 understanding requirements (3)
Lecture 11   understanding requirements (3)Lecture 11   understanding requirements (3)
Lecture 11 understanding requirements (3)
IIUI
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
securityxploded
 
Bsides Tampa Blue Team’s tool dump.
Bsides Tampa Blue Team’s tool dump.Bsides Tampa Blue Team’s tool dump.
Bsides Tampa Blue Team’s tool dump.
Alexander Kot
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
Sunipa Bera
 
Android training course
Android training courseAndroid training course
Android training course
Adarsh Pandey
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
Pete Burnap
 
Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...
Varun Mithran
 
17.security level of services
17.security level of services17.security level of services
17.security level of services
Pramod Rathore
 
Basic malware analysis
Basic malware analysis Basic malware analysis
Basic malware analysis
Cysinfo Cyber Security Community
 
SureLog intelligent response
SureLog intelligent responseSureLog intelligent response
SureLog intelligent response
Ertugrul Akbas
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
HCL Technologies
 

Similar to Slides chapter 8 (20)

Software engg. pressman_ch-8
Software engg. pressman_ch-8Software engg. pressman_ch-8
Software engg. pressman_ch-8
 
lecture_18class_diagrams.ppt
lecture_18class_diagrams.pptlecture_18class_diagrams.ppt
lecture_18class_diagrams.ppt
 
Class based modeling
Class based modelingClass based modeling
Class based modeling
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponse
 
Review 2
Review  2Review  2
Review 2
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer Overview
 
Data flow diagram
Data flow diagramData flow diagram
Data flow diagram
 
Darktrace_Threat_Visualizer_User_Guide.pdf
Darktrace_Threat_Visualizer_User_Guide.pdfDarktrace_Threat_Visualizer_User_Guide.pdf
Darktrace_Threat_Visualizer_User_Guide.pdf
 
Lecture 11 understanding requirements (3)
Lecture 11   understanding requirements (3)Lecture 11   understanding requirements (3)
Lecture 11 understanding requirements (3)
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
 
Bsides Tampa Blue Team’s tool dump.
Bsides Tampa Blue Team’s tool dump.Bsides Tampa Blue Team’s tool dump.
Bsides Tampa Blue Team’s tool dump.
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 
Android training course
Android training courseAndroid training course
Android training course
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
SECURITY SYSTEM INTEGRATION
SECURITY SYSTEM INTEGRATIONSECURITY SYSTEM INTEGRATION
SECURITY SYSTEM INTEGRATION
 
Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...
 
17.security level of services
17.security level of services17.security level of services
17.security level of services
 
Basic malware analysis
Basic malware analysis Basic malware analysis
Basic malware analysis
 
SureLog intelligent response
SureLog intelligent responseSureLog intelligent response
SureLog intelligent response
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 

More from Priyanka Shetty

Slides chapters 21-23
Slides chapters 21-23Slides chapters 21-23
Slides chapters 21-23
Priyanka Shetty
 
Slides chapters 13-14
Slides chapters 13-14Slides chapters 13-14
Slides chapters 13-14
Priyanka Shetty
 
Slides chapter 19
Slides chapter 19Slides chapter 19
Slides chapter 19
Priyanka Shetty
 
Slides chapter 17
Slides chapter 17Slides chapter 17
Slides chapter 17
Priyanka Shetty
 
Slides chapter 16
Slides chapter 16Slides chapter 16
Slides chapter 16
Priyanka Shetty
 
Slides chapter 15
Slides chapter 15Slides chapter 15
Slides chapter 15
Priyanka Shetty
 
Slides chapter 12
Slides chapter 12Slides chapter 12
Slides chapter 12
Priyanka Shetty
 
Slides chapters 26-27
Slides chapters 26-27Slides chapters 26-27
Slides chapters 26-27
Priyanka Shetty
 
Personal Hygiene
Personal HygienePersonal Hygiene
Personal Hygiene
Priyanka Shetty
 

More from Priyanka Shetty (13)

Slides chapters 21-23
Slides chapters 21-23Slides chapters 21-23
Slides chapters 21-23
 
Slides chapters 13-14
Slides chapters 13-14Slides chapters 13-14
Slides chapters 13-14
 
Slides chapter 19
Slides chapter 19Slides chapter 19
Slides chapter 19
 
Slides chapter 17
Slides chapter 17Slides chapter 17
Slides chapter 17
 
Slides chapter 16
Slides chapter 16Slides chapter 16
Slides chapter 16
 
Slides chapter 15
Slides chapter 15Slides chapter 15
Slides chapter 15
 
Slides chapter 12
Slides chapter 12Slides chapter 12
Slides chapter 12
 
Slides chapter 3
Slides chapter 3Slides chapter 3
Slides chapter 3
 
Slides chapter 2
Slides chapter 2Slides chapter 2
Slides chapter 2
 
Slides chapter 1
Slides chapter 1Slides chapter 1
Slides chapter 1
 
Slides chapters 28-32
Slides chapters 28-32Slides chapters 28-32
Slides chapters 28-32
 
Slides chapters 26-27
Slides chapters 26-27Slides chapters 26-27
Slides chapters 26-27
 
Personal Hygiene
Personal HygienePersonal Hygiene
Personal Hygiene
 

Slides chapter 8