SlideShare a Scribd company logo
Zohaib Siddique presents  Data Flow Diagram
What is it? A model that indicates the flow of data through a system. Represented using Data Flow Diagrams(DFD)
Data Flow Diagrams are: Used to perform structured analysis to determine logical requirements A graphical tool, useful for communicating with users, managers, and other IS personnel Useful for analyzing existing as well as proposed systems A relatively simple technique to learn and use
Purposes of DFDs Unexploded DFDs are useful to identify information requirements Exploded DFDs can be used for presentation education gathering feedback information from users
It is the first step towards implementation It helps guide the development of user interfaces Guides the user through choices and avoids meaningless steps Good way to verify requirements with your client. Advantages of DFD
Uses of DFDs Used to analyze the system to ensure that the design is complete  Used to partition the system into programs Used for system documentation
Data Flows data in motion marks movement of data through the system - a pipeline to carry data connects the processes, external entities and data stores Unidirectional originate OR end at a process (or both) name as specifically as possible  - reflect the composition of the data - a noun do not show control flow!  Control flow is easy to identify- a signal with only one byte - (on/off).  HINT: if you can't name it: either it's control flow, doesn't exist or you need to get more information!
Processes transform incoming data flows into outgoing data flows represent with a bubble or rounded square  name with a strong VERB/OBJECT combination; examples: create_exception_report  validate_input_characters  calculate_discount process
Data Stores data at rest represents holding areas for collection of data, processes add or retrieve data from these stores name using a noun (do not use ‘file’) only processes are connected to data stores show net flow of data between data store and process.  For instance, when access a DBMS, show only the result flow, not the request data store
Different Types of DFDs Context diagram						 Level-0 diagram (system diagram)					 Level-n diagram						 Primitive diagram
Context Diagram defines the scope of the system by identifying the system boundary contains:  one process (which represents the entire system) all sources/sinks (external entities) data flows linking the process to the sources and sinks (external entities)
Level-0 Diagram describes the overall processing of the system show one process for each major processing step or functional requirement data flows from the context appear on system diagram also (level balancing) can show a single data store to represent all data in aggregate at this level can draw duplicate sources, sinks and data stores to increase legibility
Drawing a Level-0 Diagram list the major data stores list major business steps draw a segment for each business step assemble into single DFD re-organize until satisfied number processes
Functional Decomposition similar to a series of more detailed maps iterative process of breaking the description of a system into finer and finer detail to create a set of charts in which one process on a given chart is explained in greater detail on another chart referred to as exploding, partitioning, or leveling must use your judgment to decide what goes on each level show error and exception handling on lower levels (if at all)
Quality Guidelines Completeness all components included & in project dictionary Consistency between levels: balancing, leveling Timing considerations assume system never starts and never stops Iterative nature revisions are common Drawing primitives (lowest level) when to stop?
                                 Users command & data                       Display info.                                                                                                  Alarm type                            Sensor status                                                                                Telephone no. tones         Level 0 Control pannel display Control Pannel Safe Home Software Alarm Sensors Telephone line
Level 1 User commands & dataConfigure requestConfiguration information Stop  StartConfig dataConfig . Information                                                                                                                                                             A/d msg                                                                                                                                                         passwordDisplay info. Valid ID msg Sensor info Alarm type Sensor status Telephone no.tones Control pannel Configure info Activate/Deactivate  system Interact with user Display msg &  status Control pannel  display Process password Alarm Monitor system Sensors Telephone line
Level 2 Sensor information Alarm type Sensor information Alarm Data                                                  Sensor ID, type Telephone number                                                                                                                                                     Telephone number tones                                           Sensor status Access  against setup Generate alsrm  signal Access aiainst  setup Read sensors Dial Phone
                      And that’s the end.
INVITATION Yours existance will highly be appreciated on 16th August 2009 at 10:00PM in my wedding ceremony at Sheraton Hotel, Karachi. Invitation Cards will be handed to you soon.

More Related Content

Viewers also liked

Software Engineering ppt
Software Engineering pptSoftware Engineering ppt
Software Engineering ppt
shruths2890
 
Presentation on Railway Reservation System
Presentation on Railway Reservation SystemPresentation on Railway Reservation System
Presentation on Railway Reservation System
Priyanka Sharma
 
AUTOMATED LIBRARY MANAGEMENT SYSTEM
AUTOMATED LIBRARY MANAGEMENT SYSTEMAUTOMATED LIBRARY MANAGEMENT SYSTEM
AUTOMATED LIBRARY MANAGEMENT SYSTEM
Abhishek Kumar
 
Library management system
Library management systemLibrary management system
Library management system
ashu6
 
Walmart ppt
Walmart pptWalmart ppt
Walmart ppt
Ravindra Kumar
 
Hospital management system project
Hospital management system projectHospital management system project
Hospital management system project
Himani Chopra
 

Viewers also liked (6)

Software Engineering ppt
Software Engineering pptSoftware Engineering ppt
Software Engineering ppt
 
Presentation on Railway Reservation System
Presentation on Railway Reservation SystemPresentation on Railway Reservation System
Presentation on Railway Reservation System
 
AUTOMATED LIBRARY MANAGEMENT SYSTEM
AUTOMATED LIBRARY MANAGEMENT SYSTEMAUTOMATED LIBRARY MANAGEMENT SYSTEM
AUTOMATED LIBRARY MANAGEMENT SYSTEM
 
Library management system
Library management systemLibrary management system
Library management system
 
Walmart ppt
Walmart pptWalmart ppt
Walmart ppt
 
Hospital management system project
Hospital management system projectHospital management system project
Hospital management system project
 

Similar to Zohaib Dfd

Analysis modelling
Analysis modellingAnalysis modelling
Analysis modelling
saurabhshertukde
 
Aps11 design interface
Aps11 design interfaceAps11 design interface
Aps11 design interface
Arif Rahman
 
Slides chapter 8
Slides chapter 8Slides chapter 8
Slides chapter 8
Priyanka Shetty
 
9001 qb0904 prolog lite (web version)
9001 qb0904 prolog lite (web version)9001 qb0904 prolog lite (web version)
9001 qb0904 prolog lite (web version)
Carol Lang
 
Prolog Lite Temperature Monitoring System
Prolog Lite Temperature Monitoring SystemProlog Lite Temperature Monitoring System
Prolog Lite Temperature Monitoring System
Carol Lang
 
06 architectural design_workout
06 architectural design_workout06 architectural design_workout
06 architectural design_workout
University of Computer Science and Technology
 
Distributed Control System Operation seminar
Distributed Control System  Operation seminarDistributed Control System  Operation seminar
Distributed Control System Operation seminar
Ahmed Ramadan
 
Speech oriented devices and touch panels
Speech oriented devices and touch panelsSpeech oriented devices and touch panels
Speech oriented devices and touch panels
Mohit Mundra
 
Dcs operator training
Dcs operator trainingDcs operator training
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
Rence Montanes
 
CO--MODULE-1 (b) - Input-Output-Organization.pptx
CO--MODULE-1 (b) - Input-Output-Organization.pptxCO--MODULE-1 (b) - Input-Output-Organization.pptx
CO--MODULE-1 (b) - Input-Output-Organization.pptx
ahmedsalik057
 
Asset Insight Manager (AIM)
Asset Insight Manager (AIM) Asset Insight Manager (AIM)
Asset Insight Manager (AIM)
Dean Bishop
 
Facilities Show Presentation1
Facilities Show Presentation1Facilities Show Presentation1
Facilities Show Presentation1
Dean Bishop
 
Asset Insight Manager. CAFM
Asset Insight Manager. CAFMAsset Insight Manager. CAFM
Asset Insight Manager. CAFM
Dean Bishop
 
SWITCHING SYSTEM SOFTWARE
SWITCHING SYSTEM SOFTWARESWITCHING SYSTEM SOFTWARE
SWITCHING SYSTEM SOFTWARE
ASFIASULTANA4
 
PandoraFMS: Free Monitoring System
PandoraFMS: Free Monitoring SystemPandoraFMS: Free Monitoring System
PandoraFMS: Free Monitoring System
Enrique Verdes
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
Rineri1
 
Software engg. pressman_ch-8
Software engg. pressman_ch-8Software engg. pressman_ch-8
Software engg. pressman_ch-8
Dhairya Joshi
 
Mini PHYTER® 10/100 Ethernet Transceivers
Mini PHYTER® 10/100 Ethernet TransceiversMini PHYTER® 10/100 Ethernet Transceivers
Mini PHYTER® 10/100 Ethernet Transceivers
Premier Farnell
 
Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)
nes
 

Similar to Zohaib Dfd (20)

Analysis modelling
Analysis modellingAnalysis modelling
Analysis modelling
 
Aps11 design interface
Aps11 design interfaceAps11 design interface
Aps11 design interface
 
Slides chapter 8
Slides chapter 8Slides chapter 8
Slides chapter 8
 
9001 qb0904 prolog lite (web version)
9001 qb0904 prolog lite (web version)9001 qb0904 prolog lite (web version)
9001 qb0904 prolog lite (web version)
 
Prolog Lite Temperature Monitoring System
Prolog Lite Temperature Monitoring SystemProlog Lite Temperature Monitoring System
Prolog Lite Temperature Monitoring System
 
06 architectural design_workout
06 architectural design_workout06 architectural design_workout
06 architectural design_workout
 
Distributed Control System Operation seminar
Distributed Control System  Operation seminarDistributed Control System  Operation seminar
Distributed Control System Operation seminar
 
Speech oriented devices and touch panels
Speech oriented devices and touch panelsSpeech oriented devices and touch panels
Speech oriented devices and touch panels
 
Dcs operator training
Dcs operator trainingDcs operator training
Dcs operator training
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
 
CO--MODULE-1 (b) - Input-Output-Organization.pptx
CO--MODULE-1 (b) - Input-Output-Organization.pptxCO--MODULE-1 (b) - Input-Output-Organization.pptx
CO--MODULE-1 (b) - Input-Output-Organization.pptx
 
Asset Insight Manager (AIM)
Asset Insight Manager (AIM) Asset Insight Manager (AIM)
Asset Insight Manager (AIM)
 
Facilities Show Presentation1
Facilities Show Presentation1Facilities Show Presentation1
Facilities Show Presentation1
 
Asset Insight Manager. CAFM
Asset Insight Manager. CAFMAsset Insight Manager. CAFM
Asset Insight Manager. CAFM
 
SWITCHING SYSTEM SOFTWARE
SWITCHING SYSTEM SOFTWARESWITCHING SYSTEM SOFTWARE
SWITCHING SYSTEM SOFTWARE
 
PandoraFMS: Free Monitoring System
PandoraFMS: Free Monitoring SystemPandoraFMS: Free Monitoring System
PandoraFMS: Free Monitoring System
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
 
Software engg. pressman_ch-8
Software engg. pressman_ch-8Software engg. pressman_ch-8
Software engg. pressman_ch-8
 
Mini PHYTER® 10/100 Ethernet Transceivers
Mini PHYTER® 10/100 Ethernet TransceiversMini PHYTER® 10/100 Ethernet Transceivers
Mini PHYTER® 10/100 Ethernet Transceivers
 
Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)
 

More from Federal Urdu University

Ntc internship report
Ntc internship reportNtc internship report
Ntc internship report
Federal Urdu University
 
Network security at_osi_layers
Network security at_osi_layersNetwork security at_osi_layers
Network security at_osi_layers
Federal Urdu University
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
Federal Urdu University
 
Network Security Lec5
Network Security  Lec5Network Security  Lec5
Network Security Lec5
Federal Urdu University
 
Network Security
Network SecurityNetwork Security
Network Security
Federal Urdu University
 
Unix
UnixUnix
Os Linux Documentation
Os Linux DocumentationOs Linux Documentation
Os Linux Documentation
Federal Urdu University
 
Os Linux
Os LinuxOs Linux
Maria Managment Spectrum
Maria Managment SpectrumMaria Managment Spectrum
Maria Managment Spectrum
Federal Urdu University
 
Zeeshan Estimation
Zeeshan EstimationZeeshan Estimation
Zeeshan Estimation
Federal Urdu University
 
Zahid Asd
Zahid AsdZahid Asd
Umar Erd
Umar ErdUmar Erd
Sohrab Waterfall Vs Rad
Sohrab Waterfall Vs RadSohrab Waterfall Vs Rad
Sohrab Waterfall Vs Rad
Federal Urdu University
 
Sidra Agile Software Process
Sidra Agile Software ProcessSidra Agile Software Process
Sidra Agile Software Process
Federal Urdu University
 
Muzammil Prescriptive Vs Agile Process Models
Muzammil Prescriptive Vs Agile Process ModelsMuzammil Prescriptive Vs Agile Process Models
Muzammil Prescriptive Vs Agile Process Models
Federal Urdu University
 
Muzammil Agile Vs Prescriptive
Muzammil Agile Vs PrescriptiveMuzammil Agile Vs Prescriptive
Muzammil Agile Vs Prescriptive
Federal Urdu University
 
Khurram Spiral
Khurram SpiralKhurram Spiral
Khurram Spiral
Federal Urdu University
 
Hira Xp
Hira XpHira Xp
Faisal Incremental Model
Faisal Incremental ModelFaisal Incremental Model
Faisal Incremental Model
Federal Urdu University
 
Ather Proactive Vs Reactive
Ather Proactive Vs ReactiveAther Proactive Vs Reactive
Ather Proactive Vs Reactive
Federal Urdu University
 

More from Federal Urdu University (20)

Ntc internship report
Ntc internship reportNtc internship report
Ntc internship report
 
Network security at_osi_layers
Network security at_osi_layersNetwork security at_osi_layers
Network security at_osi_layers
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
 
Network Security Lec5
Network Security  Lec5Network Security  Lec5
Network Security Lec5
 
Network Security
Network SecurityNetwork Security
Network Security
 
Unix
UnixUnix
Unix
 
Os Linux Documentation
Os Linux DocumentationOs Linux Documentation
Os Linux Documentation
 
Os Linux
Os LinuxOs Linux
Os Linux
 
Maria Managment Spectrum
Maria Managment SpectrumMaria Managment Spectrum
Maria Managment Spectrum
 
Zeeshan Estimation
Zeeshan EstimationZeeshan Estimation
Zeeshan Estimation
 
Zahid Asd
Zahid AsdZahid Asd
Zahid Asd
 
Umar Erd
Umar ErdUmar Erd
Umar Erd
 
Sohrab Waterfall Vs Rad
Sohrab Waterfall Vs RadSohrab Waterfall Vs Rad
Sohrab Waterfall Vs Rad
 
Sidra Agile Software Process
Sidra Agile Software ProcessSidra Agile Software Process
Sidra Agile Software Process
 
Muzammil Prescriptive Vs Agile Process Models
Muzammil Prescriptive Vs Agile Process ModelsMuzammil Prescriptive Vs Agile Process Models
Muzammil Prescriptive Vs Agile Process Models
 
Muzammil Agile Vs Prescriptive
Muzammil Agile Vs PrescriptiveMuzammil Agile Vs Prescriptive
Muzammil Agile Vs Prescriptive
 
Khurram Spiral
Khurram SpiralKhurram Spiral
Khurram Spiral
 
Hira Xp
Hira XpHira Xp
Hira Xp
 
Faisal Incremental Model
Faisal Incremental ModelFaisal Incremental Model
Faisal Incremental Model
 
Ather Proactive Vs Reactive
Ather Proactive Vs ReactiveAther Proactive Vs Reactive
Ather Proactive Vs Reactive
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Zohaib Dfd

  • 1. Zohaib Siddique presents Data Flow Diagram
  • 2. What is it? A model that indicates the flow of data through a system. Represented using Data Flow Diagrams(DFD)
  • 3. Data Flow Diagrams are: Used to perform structured analysis to determine logical requirements A graphical tool, useful for communicating with users, managers, and other IS personnel Useful for analyzing existing as well as proposed systems A relatively simple technique to learn and use
  • 4. Purposes of DFDs Unexploded DFDs are useful to identify information requirements Exploded DFDs can be used for presentation education gathering feedback information from users
  • 5. It is the first step towards implementation It helps guide the development of user interfaces Guides the user through choices and avoids meaningless steps Good way to verify requirements with your client. Advantages of DFD
  • 6. Uses of DFDs Used to analyze the system to ensure that the design is complete Used to partition the system into programs Used for system documentation
  • 7. Data Flows data in motion marks movement of data through the system - a pipeline to carry data connects the processes, external entities and data stores Unidirectional originate OR end at a process (or both) name as specifically as possible - reflect the composition of the data - a noun do not show control flow! Control flow is easy to identify- a signal with only one byte - (on/off). HINT: if you can't name it: either it's control flow, doesn't exist or you need to get more information!
  • 8. Processes transform incoming data flows into outgoing data flows represent with a bubble or rounded square name with a strong VERB/OBJECT combination; examples: create_exception_report validate_input_characters calculate_discount process
  • 9. Data Stores data at rest represents holding areas for collection of data, processes add or retrieve data from these stores name using a noun (do not use ‘file’) only processes are connected to data stores show net flow of data between data store and process. For instance, when access a DBMS, show only the result flow, not the request data store
  • 10. Different Types of DFDs Context diagram Level-0 diagram (system diagram) Level-n diagram Primitive diagram
  • 11. Context Diagram defines the scope of the system by identifying the system boundary contains: one process (which represents the entire system) all sources/sinks (external entities) data flows linking the process to the sources and sinks (external entities)
  • 12. Level-0 Diagram describes the overall processing of the system show one process for each major processing step or functional requirement data flows from the context appear on system diagram also (level balancing) can show a single data store to represent all data in aggregate at this level can draw duplicate sources, sinks and data stores to increase legibility
  • 13. Drawing a Level-0 Diagram list the major data stores list major business steps draw a segment for each business step assemble into single DFD re-organize until satisfied number processes
  • 14. Functional Decomposition similar to a series of more detailed maps iterative process of breaking the description of a system into finer and finer detail to create a set of charts in which one process on a given chart is explained in greater detail on another chart referred to as exploding, partitioning, or leveling must use your judgment to decide what goes on each level show error and exception handling on lower levels (if at all)
  • 15. Quality Guidelines Completeness all components included & in project dictionary Consistency between levels: balancing, leveling Timing considerations assume system never starts and never stops Iterative nature revisions are common Drawing primitives (lowest level) when to stop?
  • 16. Users command & data Display info. Alarm type Sensor status Telephone no. tones Level 0 Control pannel display Control Pannel Safe Home Software Alarm Sensors Telephone line
  • 17. Level 1 User commands & dataConfigure requestConfiguration information Stop StartConfig dataConfig . Information A/d msg passwordDisplay info. Valid ID msg Sensor info Alarm type Sensor status Telephone no.tones Control pannel Configure info Activate/Deactivate system Interact with user Display msg & status Control pannel display Process password Alarm Monitor system Sensors Telephone line
  • 18. Level 2 Sensor information Alarm type Sensor information Alarm Data Sensor ID, type Telephone number Telephone number tones Sensor status Access against setup Generate alsrm signal Access aiainst setup Read sensors Dial Phone
  • 19. And that’s the end.
  • 20. INVITATION Yours existance will highly be appreciated on 16th August 2009 at 10:00PM in my wedding ceremony at Sheraton Hotel, Karachi. Invitation Cards will be handed to you soon.