SlideShare a Scribd company logo
FSD-Unit-II
Customer Requirements
• User ( Customer requirement) : Customer
requirements are high level abstract statements
of the system requirement for the customer and
end user of the system. This requirement
describes what services the system is expected to
provide to customers and the situations under
which it must operate.
• So The user requirement or customer
requirement is requirement that specifies what
the user expects the software to be able to do.
List of Customer requirements
• Operational distribution or deployment: Where will the
system be used?
• Performance and related parameters: What are the
critical system parameters required.
• Utilization environments: How are the various system
components to be used?
• Effectiveness requirements: How effective or efficient
must the system be in performing the task.
• Operational life cycle: How long will the system be in
use by the user?
• Environment: What environments will the system be
expected to operate in an effective manner?
Continue…
Requirements
System
Requirements
Functional
Requirements
Non
Functional
Requirements
Customer
Requirements
Organization of SRS
• Organization of SRS document depends on the
system analyst and the policies of company and it
also depends on the product being developed.
• Different project may require their requirement
to be organized differently means there is no one
method that is suitable for all projects.
• However there are three basic issue that must be
included in all SRS document that is Functional
requirement ,non functional requirement and
guidelines of system implementation.
Continue…
• Here is the sample of SRS document which can
be used as a guideline to organize the
document.
1 Introduction
1.1 Purpose
1.2 Scope
1.3 Definitions, Acronyms, and Abbreviations
1.4 References
1.5 Overview
2 Overall Description
2.1 Product perspective
2.1.1 System interfaces
2.1.2 User interfaces
2.1.3 Hardware interfaces
2.1.4 Software interfaces
2.1.5 Communication interfaces
2.1.6 Memory constraints
2.1.7 Operations
2.2 Product functions
2.3 User characteristics
2.4 Constraints
2.5 Assumptions and dependencies
3 Specific requirements
3.1 External interfaces
3.2 Functions requirements
3.3 Performance requirements
3.4 Logical database requirements
3.5 Design constraints
3.6 Software system attributes
3.7 Organizing the specific requirements
3.8 Additional Comments
4 Supporting information
Shortcomings of a DFD model
• In the DFD model, the function performed by a bubble is
judged from its label. However, a short label may not
capture the entire functionality of a bubble. For example,
a bubble named find-book-position has only intuitive
meaning and does not specify several things, e.g. what
happens when some input information are missing or are
incorrect. Further, the find-book position bubble may not
convey anything regarding what happens when the
required book is missing.
• Control aspects are not defined by a DFD. For instance,
the order in which inputs are consumed and outputs are
produced by a bubble is not specified.
Continue…
• There is no any particular method or guideline for
decomposition of function into sub-functions. it is highly
subjective and depend on the choice and judgment of
the analyst. Due to this reason, even for the same
problem, Many alternative DFD representations are
possible.
Architectural Design
• s/w architecture design is a description of how a system is
organized.
• You can identify the overall structure of the system, sub-systems,
modules and their relationships.
• It is derived from the DFD of the system.
• The out put of architecture design  is architectural model.
• Architecture should be of individual programs or it should be
included of different sub-systems.
Architecture Design decisions
• Decisions are made by system architects.
• Decisions are purely based on the type of the system.
• Also depend on the functional and non-functional requirements.
• Functional reqn contain the functions or the features supproted
by the system.
10
• Non-functional reqn are:
Architectural views
• Architectural design should be documented so that it can be
used in future.
• s/w architectures may be documented form different views listed
below:
• Conceptual view
– It is an abstract view of the system.
– It shows detailed decompositions of the system.
• Logical view
– It shows key concepts of the system as objects and classes.
11
-Performance -Security -Availability
-Safety -Maintainability - Reliability
• Process view
– This shows how the system is composed of interacting
process at run time.
• Development view
– It shows the breakdown structure of s/w into modules.
• Physical view
– It shows the system hardware and how s/w components are
distributed across them.
Architectural Patterns
• Architectural patterns are a means of reusing knowledge about
generic (સામાન્ય) system architectures.
• It is the description of a system organization.
• Commonly used architectural patterns includes.
12
1. Layered
architecture
2. Repository
architecture
3. Client-Server
architecture
4. Pipe and filter
architecture
1. Layered architecture
• Layered architecture pattern describe separation and
independence.
• It allows to change the view independently.
• In it the system is organized into separate layers and each layer
can use the services offered by the layer under it.
• Example is shown in the fig.
13
• Advantages
– adding a new view or changing an existing view can be done
without changing in the base model.
– This architecture is portable.
– Changes in one layer do not affect another.
– Authentication be provided in each layer.
• Disadvantages
– Clean separation between each layer is difficult.
– Due to multiple layers, performance should be degrade.
• Application
– Required when need of multilevel security.
– Where development is spread across several teams.
14
2. Repository(a place to store information or storage)
architecture
• In it, all data in a system is managed in a central repository.
• Repository is accessible to all the components which do not
interact directly, but only through repository.
• Example of this architecture is : Management Information
System (MIS).
• It provides an efficient way to share large amount of data. No
need to transmit data explicitly.
• Application
– Used where large amount of information are generated or
required storage capacity is high.
• Advantages
– Components can be independent, they do not need to know
the existence of other components.
– Changes made by one component can be circulated to all.
15
– Data managed consistently.
• Disadvantages
– Single point failure can affect the whole system.
– It is difficult to communicate through repository in a system.
– Distributing the repository among several computers are
quite difficult.
3. Client-Server architecture.
• In this architecture, each service delivered from a separate
server.
• Clients are users of these services and they access servers to use
services.
• Client must have the knowledge of the available servers.
• While servers do not need to know how many clients are
accessing its services.
• Clients use RPC (Remote Procedure Call) to access services of
servers.
16
• Clients makes a request to server and waits until it receives a
reply.
• Fig is shown here.
• Application
– Applicable when data in a shared database has to be
accessed from different locations.
– Used when the load on a system is variable.
• Advantages
– It is a distributed architecture across a network.
– Functionality of the servers can be accessible by all the
clients without implementing them. 17
• Disadvantages
– At server level, a single point failure may cause the whole
system fail.
– Performance may be unpredictable as it depends on the
network type.
4. Pipe and Filter architecture
• In which functional transformations process their inputs and
produce outputs.
• Data flows from one component to other (as in a pipe) for
processing.
• Processing components are called filters, which are provided as
inputs and processed until converted to outputs.
• Transformation may be executed sequentially or parallel.
• Application
– Used in both batch and transaction based data processing
system.
18

More Related Content

What's hot

Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2
Raj vardhan
 
Distributed System ppt
Distributed System pptDistributed System ppt
Architec design introduction
Architec design introductionArchitec design introduction
Architec design introduction
Dr.Jayanthi ramasamy
 
Software Engineering - Ch8
Software Engineering - Ch8Software Engineering - Ch8
Software Engineering - Ch8
Siddharth Ayer
 
Strategy of software design
Strategy of software designStrategy of software design
Strategy of software design
Self-employed
 
Seii unit7 component-level-design
Seii unit7 component-level-designSeii unit7 component-level-design
Seii unit7 component-level-design
Ahmad sohail Kakar
 
Pressman ch-11-component-level-design
Pressman ch-11-component-level-designPressman ch-11-component-level-design
Pressman ch-11-component-level-design
Oliver Cheng
 
Requirements Engineering - "Ch2 an introduction to requirements"
Requirements Engineering - "Ch2 an introduction to requirements"Requirements Engineering - "Ch2 an introduction to requirements"
Requirements Engineering - "Ch2 an introduction to requirements"
Ra'Fat Al-Msie'deen
 
SRS(software requirement specification)
SRS(software requirement specification)SRS(software requirement specification)
SRS(software requirement specification)
Akash Kumar Dhameja
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
Dr Sukhpal Singh Gill
 
Srs
SrsSrs
Functional Specification with Use-Cases
Functional Specification with Use-CasesFunctional Specification with Use-Cases
Functional Specification with Use-Cases
Prof. Amir Tomer
 
6. FUNDAMENTALS OF SE AND REQUIREMENT ENGINEERING.ppt
6. FUNDAMENTALS OF SE AND REQUIREMENT ENGINEERING.ppt6. FUNDAMENTALS OF SE AND REQUIREMENT ENGINEERING.ppt
6. FUNDAMENTALS OF SE AND REQUIREMENT ENGINEERING.ppt
PedadaSaikumar
 
Bus information live monitoring system
Bus information live monitoring systemBus information live monitoring system
Bus information live monitoring system
Venkat Projects
 
Requirement specification (SRS)
Requirement specification (SRS)Requirement specification (SRS)
Requirement specification (SRS)
kunj desai
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specification
Aman Adhikari
 
QSpiders - Server Architecture
QSpiders - Server ArchitectureQSpiders - Server Architecture
QSpiders - Server Architecture
Qspiders - Software Testing Training Institute
 
SE2018_Lec 16_ Architectural Design
SE2018_Lec 16_ Architectural DesignSE2018_Lec 16_ Architectural Design
SE2018_Lec 16_ Architectural Design
Amr E. Mohamed
 
System design
System designSystem design
System design
Daniyal Ali
 

What's hot (19)

Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2Introduction To Software Concepts Unit 1 & 2
Introduction To Software Concepts Unit 1 & 2
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
Architec design introduction
Architec design introductionArchitec design introduction
Architec design introduction
 
Software Engineering - Ch8
Software Engineering - Ch8Software Engineering - Ch8
Software Engineering - Ch8
 
Strategy of software design
Strategy of software designStrategy of software design
Strategy of software design
 
Seii unit7 component-level-design
Seii unit7 component-level-designSeii unit7 component-level-design
Seii unit7 component-level-design
 
Pressman ch-11-component-level-design
Pressman ch-11-component-level-designPressman ch-11-component-level-design
Pressman ch-11-component-level-design
 
Requirements Engineering - "Ch2 an introduction to requirements"
Requirements Engineering - "Ch2 an introduction to requirements"Requirements Engineering - "Ch2 an introduction to requirements"
Requirements Engineering - "Ch2 an introduction to requirements"
 
SRS(software requirement specification)
SRS(software requirement specification)SRS(software requirement specification)
SRS(software requirement specification)
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
Srs
SrsSrs
Srs
 
Functional Specification with Use-Cases
Functional Specification with Use-CasesFunctional Specification with Use-Cases
Functional Specification with Use-Cases
 
6. FUNDAMENTALS OF SE AND REQUIREMENT ENGINEERING.ppt
6. FUNDAMENTALS OF SE AND REQUIREMENT ENGINEERING.ppt6. FUNDAMENTALS OF SE AND REQUIREMENT ENGINEERING.ppt
6. FUNDAMENTALS OF SE AND REQUIREMENT ENGINEERING.ppt
 
Bus information live monitoring system
Bus information live monitoring systemBus information live monitoring system
Bus information live monitoring system
 
Requirement specification (SRS)
Requirement specification (SRS)Requirement specification (SRS)
Requirement specification (SRS)
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specification
 
QSpiders - Server Architecture
QSpiders - Server ArchitectureQSpiders - Server Architecture
QSpiders - Server Architecture
 
SE2018_Lec 16_ Architectural Design
SE2018_Lec 16_ Architectural DesignSE2018_Lec 16_ Architectural Design
SE2018_Lec 16_ Architectural Design
 
System design
System designSystem design
System design
 

Similar to Unit ii

Architecture Design in Software Engineering
Architecture Design in Software EngineeringArchitecture Design in Software Engineering
Architecture Design in Software Engineering
cricket2ime
 
1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docx1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docx
jeremylockett77
 
10 architectural design
10 architectural design10 architectural design
10 architectural design
Ayesha Bhatti
 
Un it 2-se-mod-staff
Un it 2-se-mod-staffUn it 2-se-mod-staff
Un it 2-se-mod-staff
vijisvs2012
 
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
Jayanthi Kannan MK
 
PayPal Resilient System Design
PayPal Resilient System DesignPayPal Resilient System Design
PayPal Resilient System Design
Pradeep Ballal
 
Railway Reservation System - Software Engineering
Railway Reservation System - Software EngineeringRailway Reservation System - Software Engineering
Railway Reservation System - Software Engineering
Lalit Pal
 
Software Architecture
Software ArchitectureSoftware Architecture
Software Architecture
Ahmed Misbah
 
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-01_Reference-Material-I.pptx
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-01_Reference-Material-I.pptxWINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-01_Reference-Material-I.pptx
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-01_Reference-Material-I.pptx
Vivekananda Gn
 
Software Engineering Lec 4-requirments
Software Engineering Lec 4-requirmentsSoftware Engineering Lec 4-requirments
Software Engineering Lec 4-requirments
Taymoor Nazmy
 
Shared information systems
Shared information systemsShared information systems
Shared information systems
Himanshu
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentation
dikshagupta111
 
Software architecture categories and views
Software architecture categories and viewsSoftware architecture categories and views
Software architecture categories and views
John Chou
 
SE - Software Requirements
SE - Software RequirementsSE - Software Requirements
SE - Software Requirements
Jomel Penalba
 
Architectural design1
Architectural design1Architectural design1
Architectural design1
Zahid Hussain
 
340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdf340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdf
krishnaraj714229
 
Software engineering lecture 1
Software engineering  lecture 1Software engineering  lecture 1
Software engineering lecture 1
JusperKato
 
W4 lecture 7&8 - requirements gathering
W4 lecture 7&8 - requirements gatheringW4 lecture 7&8 - requirements gathering
W4 lecture 7&8 - requirements gathering
Fareeha Iftikhar
 
4. system models
4. system models4. system models
4. system models
AbDul ThaYyal
 
architectural design
 architectural design architectural design
architectural design
Preeti Mishra
 

Similar to Unit ii (20)

Architecture Design in Software Engineering
Architecture Design in Software EngineeringArchitecture Design in Software Engineering
Architecture Design in Software Engineering
 
1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docx1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docx
 
10 architectural design
10 architectural design10 architectural design
10 architectural design
 
Un it 2-se-mod-staff
Un it 2-se-mod-staffUn it 2-se-mod-staff
Un it 2-se-mod-staff
 
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf2nd MODULE  Software Requirements   _ SW ENGG  22CSE141.pdf
2nd MODULE Software Requirements _ SW ENGG 22CSE141.pdf
 
PayPal Resilient System Design
PayPal Resilient System DesignPayPal Resilient System Design
PayPal Resilient System Design
 
Railway Reservation System - Software Engineering
Railway Reservation System - Software EngineeringRailway Reservation System - Software Engineering
Railway Reservation System - Software Engineering
 
Software Architecture
Software ArchitectureSoftware Architecture
Software Architecture
 
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-01_Reference-Material-I.pptx
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-01_Reference-Material-I.pptxWINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-01_Reference-Material-I.pptx
WINSEM2022-23_SWE2004_ETH_VL2022230501954_2023-02-01_Reference-Material-I.pptx
 
Software Engineering Lec 4-requirments
Software Engineering Lec 4-requirmentsSoftware Engineering Lec 4-requirments
Software Engineering Lec 4-requirments
 
Shared information systems
Shared information systemsShared information systems
Shared information systems
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentation
 
Software architecture categories and views
Software architecture categories and viewsSoftware architecture categories and views
Software architecture categories and views
 
SE - Software Requirements
SE - Software RequirementsSE - Software Requirements
SE - Software Requirements
 
Architectural design1
Architectural design1Architectural design1
Architectural design1
 
340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdf340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdf
 
Software engineering lecture 1
Software engineering  lecture 1Software engineering  lecture 1
Software engineering lecture 1
 
W4 lecture 7&8 - requirements gathering
W4 lecture 7&8 - requirements gatheringW4 lecture 7&8 - requirements gathering
W4 lecture 7&8 - requirements gathering
 
4. system models
4. system models4. system models
4. system models
 
architectural design
 architectural design architectural design
architectural design
 

More from Sangeetha Rangarajan

Unit iv
Unit ivUnit iv
Unit iii
Unit iiiUnit iii
Unit ii update
Unit ii updateUnit ii update
Unit ii update
Sangeetha Rangarajan
 
Unit i FUNDAMENTALS OF SOFTWARE ENGINEERING
Unit i FUNDAMENTALS OF SOFTWARE ENGINEERINGUnit i FUNDAMENTALS OF SOFTWARE ENGINEERING
Unit i FUNDAMENTALS OF SOFTWARE ENGINEERING
Sangeetha Rangarajan
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Sangeetha Rangarajan
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
Sangeetha Rangarajan
 
network administration directory access and remote access
network administration directory access and remote accessnetwork administration directory access and remote access
network administration directory access and remote access
Sangeetha Rangarajan
 
Chemistry(matter and change)
Chemistry(matter and change)Chemistry(matter and change)
Chemistry(matter and change)
Sangeetha Rangarajan
 
Unit 3
Unit 3Unit 3
unit 2
unit 2unit 2
Ado.net
Ado.netAdo.net

More from Sangeetha Rangarajan (11)

Unit iv
Unit ivUnit iv
Unit iv
 
Unit iii
Unit iiiUnit iii
Unit iii
 
Unit ii update
Unit ii updateUnit ii update
Unit ii update
 
Unit i FUNDAMENTALS OF SOFTWARE ENGINEERING
Unit i FUNDAMENTALS OF SOFTWARE ENGINEERINGUnit i FUNDAMENTALS OF SOFTWARE ENGINEERING
Unit i FUNDAMENTALS OF SOFTWARE ENGINEERING
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
network administration directory access and remote access
network administration directory access and remote accessnetwork administration directory access and remote access
network administration directory access and remote access
 
Chemistry(matter and change)
Chemistry(matter and change)Chemistry(matter and change)
Chemistry(matter and change)
 
Unit 3
Unit 3Unit 3
Unit 3
 
unit 2
unit 2unit 2
unit 2
 
Ado.net
Ado.netAdo.net
Ado.net
 

Recently uploaded

CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 

Unit ii

  • 2. Customer Requirements • User ( Customer requirement) : Customer requirements are high level abstract statements of the system requirement for the customer and end user of the system. This requirement describes what services the system is expected to provide to customers and the situations under which it must operate. • So The user requirement or customer requirement is requirement that specifies what the user expects the software to be able to do.
  • 3. List of Customer requirements • Operational distribution or deployment: Where will the system be used? • Performance and related parameters: What are the critical system parameters required. • Utilization environments: How are the various system components to be used? • Effectiveness requirements: How effective or efficient must the system be in performing the task. • Operational life cycle: How long will the system be in use by the user? • Environment: What environments will the system be expected to operate in an effective manner?
  • 5. Organization of SRS • Organization of SRS document depends on the system analyst and the policies of company and it also depends on the product being developed. • Different project may require their requirement to be organized differently means there is no one method that is suitable for all projects. • However there are three basic issue that must be included in all SRS document that is Functional requirement ,non functional requirement and guidelines of system implementation.
  • 6. Continue… • Here is the sample of SRS document which can be used as a guideline to organize the document. 1 Introduction 1.1 Purpose 1.2 Scope 1.3 Definitions, Acronyms, and Abbreviations 1.4 References 1.5 Overview
  • 7. 2 Overall Description 2.1 Product perspective 2.1.1 System interfaces 2.1.2 User interfaces 2.1.3 Hardware interfaces 2.1.4 Software interfaces 2.1.5 Communication interfaces 2.1.6 Memory constraints 2.1.7 Operations 2.2 Product functions 2.3 User characteristics 2.4 Constraints 2.5 Assumptions and dependencies 3 Specific requirements 3.1 External interfaces 3.2 Functions requirements 3.3 Performance requirements 3.4 Logical database requirements 3.5 Design constraints 3.6 Software system attributes 3.7 Organizing the specific requirements 3.8 Additional Comments 4 Supporting information
  • 8. Shortcomings of a DFD model • In the DFD model, the function performed by a bubble is judged from its label. However, a short label may not capture the entire functionality of a bubble. For example, a bubble named find-book-position has only intuitive meaning and does not specify several things, e.g. what happens when some input information are missing or are incorrect. Further, the find-book position bubble may not convey anything regarding what happens when the required book is missing. • Control aspects are not defined by a DFD. For instance, the order in which inputs are consumed and outputs are produced by a bubble is not specified.
  • 9. Continue… • There is no any particular method or guideline for decomposition of function into sub-functions. it is highly subjective and depend on the choice and judgment of the analyst. Due to this reason, even for the same problem, Many alternative DFD representations are possible.
  • 10. Architectural Design • s/w architecture design is a description of how a system is organized. • You can identify the overall structure of the system, sub-systems, modules and their relationships. • It is derived from the DFD of the system. • The out put of architecture design  is architectural model. • Architecture should be of individual programs or it should be included of different sub-systems. Architecture Design decisions • Decisions are made by system architects. • Decisions are purely based on the type of the system. • Also depend on the functional and non-functional requirements. • Functional reqn contain the functions or the features supproted by the system. 10
  • 11. • Non-functional reqn are: Architectural views • Architectural design should be documented so that it can be used in future. • s/w architectures may be documented form different views listed below: • Conceptual view – It is an abstract view of the system. – It shows detailed decompositions of the system. • Logical view – It shows key concepts of the system as objects and classes. 11 -Performance -Security -Availability -Safety -Maintainability - Reliability
  • 12. • Process view – This shows how the system is composed of interacting process at run time. • Development view – It shows the breakdown structure of s/w into modules. • Physical view – It shows the system hardware and how s/w components are distributed across them. Architectural Patterns • Architectural patterns are a means of reusing knowledge about generic (સામાન્ય) system architectures. • It is the description of a system organization. • Commonly used architectural patterns includes. 12 1. Layered architecture 2. Repository architecture 3. Client-Server architecture 4. Pipe and filter architecture
  • 13. 1. Layered architecture • Layered architecture pattern describe separation and independence. • It allows to change the view independently. • In it the system is organized into separate layers and each layer can use the services offered by the layer under it. • Example is shown in the fig. 13
  • 14. • Advantages – adding a new view or changing an existing view can be done without changing in the base model. – This architecture is portable. – Changes in one layer do not affect another. – Authentication be provided in each layer. • Disadvantages – Clean separation between each layer is difficult. – Due to multiple layers, performance should be degrade. • Application – Required when need of multilevel security. – Where development is spread across several teams. 14
  • 15. 2. Repository(a place to store information or storage) architecture • In it, all data in a system is managed in a central repository. • Repository is accessible to all the components which do not interact directly, but only through repository. • Example of this architecture is : Management Information System (MIS). • It provides an efficient way to share large amount of data. No need to transmit data explicitly. • Application – Used where large amount of information are generated or required storage capacity is high. • Advantages – Components can be independent, they do not need to know the existence of other components. – Changes made by one component can be circulated to all. 15
  • 16. – Data managed consistently. • Disadvantages – Single point failure can affect the whole system. – It is difficult to communicate through repository in a system. – Distributing the repository among several computers are quite difficult. 3. Client-Server architecture. • In this architecture, each service delivered from a separate server. • Clients are users of these services and they access servers to use services. • Client must have the knowledge of the available servers. • While servers do not need to know how many clients are accessing its services. • Clients use RPC (Remote Procedure Call) to access services of servers. 16
  • 17. • Clients makes a request to server and waits until it receives a reply. • Fig is shown here. • Application – Applicable when data in a shared database has to be accessed from different locations. – Used when the load on a system is variable. • Advantages – It is a distributed architecture across a network. – Functionality of the servers can be accessible by all the clients without implementing them. 17
  • 18. • Disadvantages – At server level, a single point failure may cause the whole system fail. – Performance may be unpredictable as it depends on the network type. 4. Pipe and Filter architecture • In which functional transformations process their inputs and produce outputs. • Data flows from one component to other (as in a pipe) for processing. • Processing components are called filters, which are provided as inputs and processed until converted to outputs. • Transformation may be executed sequentially or parallel. • Application – Used in both batch and transaction based data processing system. 18