SlideShare une entreprise Scribd logo
1  sur  46
1Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
““Einstein looked for a simplified definition of nature as he believed that God is notEinstein looked for a simplified definition of nature as he believed that God is not
complex or arbitrary. No such belief will work for Software Engineers as Softwarecomplex or arbitrary. No such belief will work for Software Engineers as Software
Engineering is complex and arbitrary” – Fred BrooksEngineering is complex and arbitrary” – Fred Brooks
Lecture 2, 3 and 4Lecture 2, 3 and 4
Software ProcessSoftware Process
The software process
 A structured set of activities required to develop a
software system
Specification;
Design;
Validation;
Evolution.
 A software process model is an abstract representation
of a process. It presents a description of a process from
some particular perspective.
2Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Generic software process models
 The waterfall model
Separate and distinct phases of
specification and development.
 Evolutionary development
Specification, development and
validation are interleaved.
 Component-based software engineering
The system is assembled from existing
components.
 They are not mutually exclusive- used together, often
3Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Waterfall model
Requir ements
definition
System and
software design
Implementa tion
and unit testing
Integration and
system testing
Oper ation and
maintenance
4Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Waterfall model phases
Requirements analysis and definition
Consultation with system user
System and software design
System design partitions the requirements to hardware or
software systems
software design involves indentifying and distributing software
abstractions.
Implementation and unit testing
Unit testing involves verifying that each unit meets its
specification
5Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Waterfall model phases
Integration and system testing
Testing as a complete system. Software is delivered to customer
Operation and maintenance
Longest software life cycle phase. Involves correcting errors that
were not discovered early, improvement of system units and
evolution
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
Waterfall model benefits
 The result of each phase is one or more
approved documents
 Fits with other process models
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
Waterfall model problems
 Inflexible partitioning of the project into distinct stages
makes it difficult to respond to changing customer
requirements.
 Therefore, this model is only appropriate when the
requirements are well-understood and changes will be
fairly limited during the design process.
 Few business systems have stable requirements.
 The waterfall model is mostly used for large systems
engineering projects where a system is developed at
several sites.
 One phase has to be complete before moving onto the
next phase- that is absent in reality where overlapping
is common. 8Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Waterfall model problems
 Prone to Software freeze, problems are left for later
resolution, ignored or programmed around.
 May result inefficient software and badly structured
design
9Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Evolutionary development
 Based on the idea of
1. developing an initial implementation
2. Exposing this to the user for comments
3. Refining and retuning through many
versions until an adequate system is
developed.
10Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Evolutionary development
 Exploratory development
Objective is to work with customers
to evolve a final system from an initial outline
specification.
Should start with well-understood requirements
add new features as proposed by the customer.
11Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Evolutionary development
 Throw-away prototyping
Objective is to understand the system
requirements.
Should start with poorly understood
requirements to clarify what is really needed.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
Evolutionary development
Concurr ent
activities
Valida tion
Final
version
Development
Intermedia te
versions
Specification
Initial
version
Outline
description
13Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Evolutionary development
 Problems
Lack of process visibility;
Systems are often poorly structured;
Special skills (e.g. in languages for rapid
prototyping) may be required.
 Applicability
For small or medium-size interactive systems;
For parts of large systems (e.g. the user
interface);
For short-lifetime systems.
14Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Component-based software engineering
 Based on systematic reuse where systems
are integrated from existing components or
COTS (Commercial-off-the-shelf) systems.
 Happens when people working on project
know of designs or code which is similar to
that required
 This approach is becoming increasingly used
as component standards have emerged.
15Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Component-based software
engineering
 Process stages
Component analysis
○ What components are required, what are
available
Requirements modification
○ Not exactly what you need is found, so would you
use that or modify your requirements?
System design with reuse
○ Design the system in a way so that others are able
to reuse your system
Development and integration
○ Combining all of the reusable components
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 16
Benefits of CBSE
 Quick development
 Low cost
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 17
Drawbacks of CBSE
 Mostly never meets requirements
 Needs expert knowledge on component
analysis, reusability and integration
 Less innovation
 More or less depends on the pros and cons
of the components.
Reuse-oriented development
Requirements
specification
Component
analysis
Development
and integ ration
System design
with reuse
Requirements
modification
System
validation
18Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Incremental delivery
 An in-between approach that combines waterfall and
evolutionary model
 Rather than deliver the system as a single delivery, the
development and delivery is broken down into
increments with each increment delivering part of the
required functionality.
 User requirements are prioritised and the highest priority
requirements are included in early increments.
 Once the development of an increment is started, the
requirements are frozen though requirements for later
increments can continue to evolve.
19Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Incremental delivery
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 20
Valida te
increment
Develop system
increment
Design system
architectur e
Integrate
increment
Validate
system
Define outline
requirements
Assign requirements
to increments
System incomplete
Final
system
Incremental development advantages
 Customer value can be delivered with each
increment so system functionality is
available earlier.
 Early increments act as a prototype to help
elicit requirements for later increments.
 Lower risk of overall project failure.
 The highest priority system services tend to
receive the most testing.
 User engagement with the system
 Accelerated delivery of customer services
21Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Incremental development disadvantages
 Increments should be relatively small
(20,000 LoCs)
 Each increment should provide system
functionality
 Difficult to map customer’s requirements
onto increments of right size
 Hard to identify common facilities that are
needed for all increments
22Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Incremental development disadvantages
 Progress can be hard to judge and problems hard to
find because there is no documentation to
demonstrate what has been done.
 The normal contract may include a specification;
without a specification, different forms of contract
have to be used.
 Without a specification, what is the system being
tested against?
 Continual change tends to corrupt software structure
making it more expensive to change and evolve to
meet new requirements.
23Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Spiral development
 Process is represented as a spiral rather
than as a sequence of activities with
backtracking.
 Each loop in the spiral represents a phase in
the process.
 No fixed phases such as specification or
design - loops in the spiral are chosen
depending on what is required.
 Risks are explicitly assessed and resolved
throughout the process.
24Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Spiral model of the software
process
Risk
anal ysis
Risk
anal ysis
Risk
anal ysis
Risk
anal ysis Proto-
type 1
Prototype 2
Prototype 3
Oper a-
tional
protoype
Concept of
Oper ation
Simulations , models , benchmar ks
S/W
requir ements
Requir ement
validation
Design
V&V
Product
design Detailed
design
Code
Unit test
Integ ration
test
Acceptance
testService Develop , verify
next-level pr oduct
Evalua te alterna tives,
identify, resolv e risks
Deter mine objecti ves,
alterna tives and
constr aints
Plan ne xt phase
Integ ration
and test plan
Development
plan
Requir ements plan
Life-cy cle plan
REVIEW
25Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Spiral model sectors
 Objective setting
Specific objectives for the phase are identified.
 Risk assessment and reduction
Risks are assessed and activities put in place to reduce the
key risks.
 Development and validation
A development model for the system is chosen which can
be any of the generic models.
 Planning
The project is reviewed and the next phase of the spiral is
planned.
26Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Agile methods
 Dissatisfaction with the overheads involved in design
methods led to the creation of agile methods. These
methods:
 Focus on the code rather than the design;
 Are based on an iterative approach to software development;
 Are intended to deliver working software quickly and evolve
this quickly to meet changing requirements.
 Agile methods are probably best suited to
small/medium-sized business systems or PC products.
27Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Principles of agile methods
28Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Problems with agile methods
 It can be difficult to keep the interest of customers
who are involved in the process.
 Team members may be unsuited to the intense
involvement that characterises agile methods.
 Prioritising changes can be difficult where there are
multiple stakeholders.
 Maintaining simplicity requires extra work.
 Contracts may be a problem as with other approaches
to iterative development.
29Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Extreme programming
 Perhaps the best-known and most widely
used agile method.
 Extreme Programming (XP) takes an
‘extreme’ approach to iterative
development.
New versions may be built several times per
day;
Increments are delivered to customers every 2
weeks;
All tests must be run for every build and the
build is only accepted if tests run successfully.
30Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
The XP release cycle
Breakdown
stories to tasks
Select user
stories for this
release
Plan release
Release
software
Evaluate
system
Develop/integ rate/
test software
31Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Extreme programming practices
1
Incremental planning Requirements are recorded on Story Cards and the Stories to be
included in a release are determined by the time available and
their relative priority. The developers break these Stories into
development ŌTasksÕ.
Small Releases The minimal useful set of functionality that provides business
value is developed first. Releases of the system are frequent and
incrementally add functionality to the first release.
Simple Design Enough design is carried out to meet the current requirements
and no more.
Test first development An automated unit test framework is used to write tests for a new
piece of functionality before that functionality itself is
implemented.
Refactoring All developers are expected to refactor the code continuously as
soon as possible code improvements are found. This keeps the
code simple and maintainable.
32Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Extreme programming practices
2
Pair Programming Developers work in pairs, checking each otherÕs work and
providing the support to always do a good job.
Collective Ownership The pairs of developers work on all areas of the system, so that
no islands of expertise develop and all the developers own all the
code. Anyone can change anything.
Continuous Integration As soon as work on a task is complete it is integrated into the
whole system. After any such integration, all the unit tests in the
system must pass.
Sustainable pace Large amounts of over-time are not considered acceptable as the
net effect is often to reduce code quality and medium term
productivity
On-site Customer A representative of the end-user of the system (the Customer)
should be available full time for the use of the XP team. In an
extreme programming process, the customer is a member of the
development team and is responsible for bringing system
requirements to the team for implementation.
33Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
XP and agile principles
 Incremental development is supported through small,
frequent system releases.
 Customer involvement means full-time customer
engagement with the team.
 People not process through pair programming,
collective ownership and a process that avoids long
working hours.
 Change supported through regular system releases.
 Maintaining simplicity through constant refactoring of
code.
34Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Requirements scenarios
 In XP, user requirements are expressed as
scenarios or user stories.
 These are written on cards and the
development team break them down into
implementation tasks. These tasks are the
basis of schedule and cost estimates.
 The customer chooses the stories for
inclusion in the next release based on their
priorities and the schedule estimates.
35Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Story card for document downloading
Downloading and printing an article
First, you select the article that you want froma displayed list.You
then have to tell the systemhow you will pay for it - this can either
be through a subscription, through a company account or by credit
card.
After this, you get a copyright formfromthe systemto fill in and,
when you have submitted this, the article you want is downloaded
onto your computer.
You then choose a printer and a copy ofthe article is printed.You
tell the systemifprinting has been successful.
Ifthe article is a print-only article, you canÕt keep the PDF version
so it is automatically deleted fromyour computer.
36Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Testing in XP
 Test-first development.
 Incremental test development from
scenarios.
 User involvement in test development and
validation.
 Automated test harnesses are used to run
all component tests each time that a new
release is built.
37Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Task cards for document downloading
Task 1: Implement principal workflow
Task 2: Implement article catalog and selection
Task 3: Implement payment collection
Payment may be made in 3 different ways.The user
selects which way they wish to pay. Ifthe user
has a library subscription, then they can input the
subscriber key which should be checked by the
system.Alternatively, they can input an organisational
account number. Ifthis is valid, a debit ofthe cost
ofthe article is posted to this account. Finally, they
may input a 16 digit credit card number and expiry
date.This should be checked for validity and, if
valid a debit is posted to that credit card account.
38Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Test case description
Test 4:Test credit card validity
Input:
Astring representing the credit card number and two integers representing
the month and year when the card expires
Tests:
Check that all bytes in the string are digits
Check that the month lies between 1 and 12 and the
year is greater than or equal to the current year.
Using the first 4 digits ofthe credit card number,
check that the card issuer is valid by looking up the
card issuer table. Check credit card validity by submitting the card
number and expiry date information to the card
issuer
Output:
OK or error message indicating that the card is invalid
39Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Test-first development
 Writing tests before code clarifies the
requirements to be implemented.
 Tests are written as programs rather than
data so that they can be executed
automatically. The test includes a check
that it has executed correctly.
 All previous and new tests are automatically
run when new functionality is added. Thus
checking that the new functionality has not
introduced errors.
40Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Pair programming
 In XP, programmers work in pairs, sitting together to
develop code.
 This helps develop common ownership of code and
spreads knowledge across the team.
 It serves as an informal review process as each line of
code is looked at by more than 1 person.
 It encourages refactoring as the whole team can
benefit from this.
 Measurements suggest that development productivity
with pair programming is similar to that of two people
working independently.
41Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Rapid application
development
 Agile methods have received a lot of
attention but other approaches to rapid
application development have been used
for many years.
 These are designed to develop data-
intensive business applications and rely on
programming and presenting information
from a database.
42Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
RAD environment tools
 Database programming language
 Interface generator
 Links to office applications
 Report generators
43Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
A RAD environment
DB
prog ramming
langua ge
Interface
gener ator
Office
systems
Repor t
gener ator
Database mana gement system
Rapid application
development environment
44Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Visual programming with
reuse
File Edit Views Layout Options Help
General
Index
Menu component
Date component
Range checking
script
Tree display
component
Draw canvas
component
User prompt
component +
script
12th January 2 000
3.876
45Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
ReferenceReference
 Software Engineering by Ian Sommerville,
Chapter 4 and 17, 7th
Edition.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 46

Contenu connexe

Tendances

Enterprise Architecture
Enterprise ArchitectureEnterprise Architecture
Enterprise ArchitectureVikas Grover
 
We Need To Talk About IT Architecture
We Need To Talk About IT ArchitectureWe Need To Talk About IT Architecture
We Need To Talk About IT ArchitectureAlan McSweeney
 
Low-Code App Development
Low-Code App DevelopmentLow-Code App Development
Low-Code App DevelopmentAppian
 
Enterprise Architecture for Dummies - TOGAF 9 enterprise architecture overview
Enterprise Architecture for Dummies - TOGAF 9 enterprise architecture overviewEnterprise Architecture for Dummies - TOGAF 9 enterprise architecture overview
Enterprise Architecture for Dummies - TOGAF 9 enterprise architecture overviewWinton Winton
 
Software Project Management - Classic Mistakes
Software Project Management - Classic MistakesSoftware Project Management - Classic Mistakes
Software Project Management - Classic MistakesEmanuele Della Valle
 
unit 5 Architectural design
 unit 5 Architectural design unit 5 Architectural design
unit 5 Architectural designdevika g
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1Mohammed Romi
 
Modeling TOGAF with ArchiMate
Modeling TOGAF with ArchiMateModeling TOGAF with ArchiMate
Modeling TOGAF with ArchiMateIver Band
 
EA Intensive Course "Building Enterprise Architecture" by mr.danairat
EA Intensive Course "Building Enterprise Architecture" by mr.danairatEA Intensive Course "Building Enterprise Architecture" by mr.danairat
EA Intensive Course "Building Enterprise Architecture" by mr.danairatSoftware Park Thailand
 
How to Articulate the Value of Enterprise Architecture
How to Articulate the Value of Enterprise ArchitectureHow to Articulate the Value of Enterprise Architecture
How to Articulate the Value of Enterprise Architecturecccamericas
 
Ch22-Software Engineering 9
Ch22-Software Engineering 9Ch22-Software Engineering 9
Ch22-Software Engineering 9Ian Sommerville
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-EngineeringSaqib Raza
 
Agile Solution Architecture and Design
Agile Solution Architecture and DesignAgile Solution Architecture and Design
Agile Solution Architecture and DesignAlan McSweeney
 
Software Architecture and Design Introduction
Software Architecture and Design IntroductionSoftware Architecture and Design Introduction
Software Architecture and Design IntroductionUsman Khan
 
Software Maintenance and Evolution
Software Maintenance and EvolutionSoftware Maintenance and Evolution
Software Maintenance and Evolutionkim.mens
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9Ian Sommerville
 

Tendances (20)

Enterprise Architecture
Enterprise ArchitectureEnterprise Architecture
Enterprise Architecture
 
We Need To Talk About IT Architecture
We Need To Talk About IT ArchitectureWe Need To Talk About IT Architecture
We Need To Talk About IT Architecture
 
Low-Code App Development
Low-Code App DevelopmentLow-Code App Development
Low-Code App Development
 
Togaf Roadshow
Togaf RoadshowTogaf Roadshow
Togaf Roadshow
 
Enterprise Architecture for Dummies - TOGAF 9 enterprise architecture overview
Enterprise Architecture for Dummies - TOGAF 9 enterprise architecture overviewEnterprise Architecture for Dummies - TOGAF 9 enterprise architecture overview
Enterprise Architecture for Dummies - TOGAF 9 enterprise architecture overview
 
Software Project Management - Classic Mistakes
Software Project Management - Classic MistakesSoftware Project Management - Classic Mistakes
Software Project Management - Classic Mistakes
 
Software process
Software processSoftware process
Software process
 
unit 5 Architectural design
 unit 5 Architectural design unit 5 Architectural design
unit 5 Architectural design
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1
 
Modeling TOGAF with ArchiMate
Modeling TOGAF with ArchiMateModeling TOGAF with ArchiMate
Modeling TOGAF with ArchiMate
 
EA Intensive Course "Building Enterprise Architecture" by mr.danairat
EA Intensive Course "Building Enterprise Architecture" by mr.danairatEA Intensive Course "Building Enterprise Architecture" by mr.danairat
EA Intensive Course "Building Enterprise Architecture" by mr.danairat
 
How to Articulate the Value of Enterprise Architecture
How to Articulate the Value of Enterprise ArchitectureHow to Articulate the Value of Enterprise Architecture
How to Articulate the Value of Enterprise Architecture
 
Ch19 systems engineering
Ch19 systems engineeringCh19 systems engineering
Ch19 systems engineering
 
Ch22-Software Engineering 9
Ch22-Software Engineering 9Ch22-Software Engineering 9
Ch22-Software Engineering 9
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-Engineering
 
Agile Solution Architecture and Design
Agile Solution Architecture and DesignAgile Solution Architecture and Design
Agile Solution Architecture and Design
 
Software Architecture and Design Introduction
Software Architecture and Design IntroductionSoftware Architecture and Design Introduction
Software Architecture and Design Introduction
 
software quality
software qualitysoftware quality
software quality
 
Software Maintenance and Evolution
Software Maintenance and EvolutionSoftware Maintenance and Evolution
Software Maintenance and Evolution
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9
 

Similaire à L2 l3 l4 software process models

Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models Satya P. Joshi
 
Software lifecycle model report
Software lifecycle model reportSoftware lifecycle model report
Software lifecycle model reportAshutosh Singh
 
Elementary Probability theory Chapter 2.pptx
Elementary Probability theory Chapter 2.pptxElementary Probability theory Chapter 2.pptx
Elementary Probability theory Chapter 2.pptxethiouniverse
 
L1 overview of software engineering
L1  overview of software engineeringL1  overview of software engineering
L1 overview of software engineeringRushdi Shams
 
04_Materi Software Proses-Models(1).pptx
04_Materi Software Proses-Models(1).pptx04_Materi Software Proses-Models(1).pptx
04_Materi Software Proses-Models(1).pptxMarwondoMarwondo
 
Lecture - 11-15.pptx
Lecture - 11-15.pptxLecture - 11-15.pptx
Lecture - 11-15.pptxFarHana74914
 
Software Process in Software Engineering SE3
Software Process in Software Engineering SE3Software Process in Software Engineering SE3
Software Process in Software Engineering SE3koolkampus
 
ISE_Lecture Week 2-SW Process Models.ppt
ISE_Lecture Week 2-SW Process Models.pptISE_Lecture Week 2-SW Process Models.ppt
ISE_Lecture Week 2-SW Process Models.pptHumzaWaris1
 
Soft Eng - Software Process
Soft  Eng - Software ProcessSoft  Eng - Software Process
Soft Eng - Software ProcessJomel Penalba
 

Similaire à L2 l3 l4 software process models (20)

Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models
 
Ch17
Ch17Ch17
Ch17
 
Slcm sharbani bhattacharya
Slcm sharbani bhattacharyaSlcm sharbani bhattacharya
Slcm sharbani bhattacharya
 
Software lifecycle model report
Software lifecycle model reportSoftware lifecycle model report
Software lifecycle model report
 
Elementary Probability theory Chapter 2.pptx
Elementary Probability theory Chapter 2.pptxElementary Probability theory Chapter 2.pptx
Elementary Probability theory Chapter 2.pptx
 
L1 overview of software engineering
L1  overview of software engineeringL1  overview of software engineering
L1 overview of software engineering
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)
 
04_Materi Software Proses-Models(1).pptx
04_Materi Software Proses-Models(1).pptx04_Materi Software Proses-Models(1).pptx
04_Materi Software Proses-Models(1).pptx
 
Lecture - 11-15.pptx
Lecture - 11-15.pptxLecture - 11-15.pptx
Lecture - 11-15.pptx
 
reaserch ppt.pptx
reaserch ppt.pptxreaserch ppt.pptx
reaserch ppt.pptx
 
Software Process in Software Engineering SE3
Software Process in Software Engineering SE3Software Process in Software Engineering SE3
Software Process in Software Engineering SE3
 
ISE_Lecture Week 2-SW Process Models.ppt
ISE_Lecture Week 2-SW Process Models.pptISE_Lecture Week 2-SW Process Models.ppt
ISE_Lecture Week 2-SW Process Models.ppt
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Soft Eng - Software Process
Soft  Eng - Software ProcessSoft  Eng - Software Process
Soft Eng - Software Process
 
Ch4
Ch4Ch4
Ch4
 
Ch4
Ch4Ch4
Ch4
 
Slides chapter 3
Slides chapter 3Slides chapter 3
Slides chapter 3
 
Slides chapter 3
Slides chapter 3Slides chapter 3
Slides chapter 3
 
Sdpl1
Sdpl1Sdpl1
Sdpl1
 

Plus de Rushdi Shams

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchRushdi Shams
 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IRRushdi Shams
 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101Rushdi Shams
 
Semi-supervised classification for natural language processing
Semi-supervised classification for natural language processingSemi-supervised classification for natural language processing
Semi-supervised classification for natural language processingRushdi Shams
 
Natural Language Processing: Parsing
Natural Language Processing: ParsingNatural Language Processing: Parsing
Natural Language Processing: ParsingRushdi Shams
 
Types of machine translation
Types of machine translationTypes of machine translation
Types of machine translationRushdi Shams
 
L1 l2 l3 introduction to machine translation
L1 l2 l3  introduction to machine translationL1 l2 l3  introduction to machine translation
L1 l2 l3 introduction to machine translationRushdi Shams
 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semanticsRushdi Shams
 
Propositional logic
Propositional logicPropositional logic
Propositional logicRushdi Shams
 
Probabilistic logic
Probabilistic logicProbabilistic logic
Probabilistic logicRushdi Shams
 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structureRushdi Shams
 
Knowledge representation
Knowledge representationKnowledge representation
Knowledge representationRushdi Shams
 
L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hackingRushdi Shams
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)Rushdi Shams
 

Plus de Rushdi Shams (20)

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better Research
 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IR
 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101
 
Semi-supervised classification for natural language processing
Semi-supervised classification for natural language processingSemi-supervised classification for natural language processing
Semi-supervised classification for natural language processing
 
Natural Language Processing: Parsing
Natural Language Processing: ParsingNatural Language Processing: Parsing
Natural Language Processing: Parsing
 
Types of machine translation
Types of machine translationTypes of machine translation
Types of machine translation
 
L1 l2 l3 introduction to machine translation
L1 l2 l3  introduction to machine translationL1 l2 l3  introduction to machine translation
L1 l2 l3 introduction to machine translation
 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semantics
 
Propositional logic
Propositional logicPropositional logic
Propositional logic
 
Probabilistic logic
Probabilistic logicProbabilistic logic
Probabilistic logic
 
L15 fuzzy logic
L15  fuzzy logicL15  fuzzy logic
L15 fuzzy logic
 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structure
 
Knowledge representation
Knowledge representationKnowledge representation
Knowledge representation
 
First order logic
First order logicFirst order logic
First order logic
 
Belief function
Belief functionBelief function
Belief function
 
L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hacking
 
L4 vpn
L4  vpnL4  vpn
L4 vpn
 
L3 defense
L3  defenseL3  defense
L3 defense
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)
 
L1 phishing
L1  phishingL1  phishing
L1 phishing
 

Dernier

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

L2 l3 l4 software process models

  • 1. 1Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh ““Einstein looked for a simplified definition of nature as he believed that God is notEinstein looked for a simplified definition of nature as he believed that God is not complex or arbitrary. No such belief will work for Software Engineers as Softwarecomplex or arbitrary. No such belief will work for Software Engineers as Software Engineering is complex and arbitrary” – Fred BrooksEngineering is complex and arbitrary” – Fred Brooks Lecture 2, 3 and 4Lecture 2, 3 and 4 Software ProcessSoftware Process
  • 2. The software process  A structured set of activities required to develop a software system Specification; Design; Validation; Evolution.  A software process model is an abstract representation of a process. It presents a description of a process from some particular perspective. 2Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 3. Generic software process models  The waterfall model Separate and distinct phases of specification and development.  Evolutionary development Specification, development and validation are interleaved.  Component-based software engineering The system is assembled from existing components.  They are not mutually exclusive- used together, often 3Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 4. Waterfall model Requir ements definition System and software design Implementa tion and unit testing Integration and system testing Oper ation and maintenance 4Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 5. Waterfall model phases Requirements analysis and definition Consultation with system user System and software design System design partitions the requirements to hardware or software systems software design involves indentifying and distributing software abstractions. Implementation and unit testing Unit testing involves verifying that each unit meets its specification 5Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 6. Waterfall model phases Integration and system testing Testing as a complete system. Software is delivered to customer Operation and maintenance Longest software life cycle phase. Involves correcting errors that were not discovered early, improvement of system units and evolution Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
  • 7. Waterfall model benefits  The result of each phase is one or more approved documents  Fits with other process models Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
  • 8. Waterfall model problems  Inflexible partitioning of the project into distinct stages makes it difficult to respond to changing customer requirements.  Therefore, this model is only appropriate when the requirements are well-understood and changes will be fairly limited during the design process.  Few business systems have stable requirements.  The waterfall model is mostly used for large systems engineering projects where a system is developed at several sites.  One phase has to be complete before moving onto the next phase- that is absent in reality where overlapping is common. 8Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 9. Waterfall model problems  Prone to Software freeze, problems are left for later resolution, ignored or programmed around.  May result inefficient software and badly structured design 9Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 10. Evolutionary development  Based on the idea of 1. developing an initial implementation 2. Exposing this to the user for comments 3. Refining and retuning through many versions until an adequate system is developed. 10Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 11. Evolutionary development  Exploratory development Objective is to work with customers to evolve a final system from an initial outline specification. Should start with well-understood requirements add new features as proposed by the customer. 11Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 12. Evolutionary development  Throw-away prototyping Objective is to understand the system requirements. Should start with poorly understood requirements to clarify what is really needed. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
  • 13. Evolutionary development Concurr ent activities Valida tion Final version Development Intermedia te versions Specification Initial version Outline description 13Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 14. Evolutionary development  Problems Lack of process visibility; Systems are often poorly structured; Special skills (e.g. in languages for rapid prototyping) may be required.  Applicability For small or medium-size interactive systems; For parts of large systems (e.g. the user interface); For short-lifetime systems. 14Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 15. Component-based software engineering  Based on systematic reuse where systems are integrated from existing components or COTS (Commercial-off-the-shelf) systems.  Happens when people working on project know of designs or code which is similar to that required  This approach is becoming increasingly used as component standards have emerged. 15Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 16. Component-based software engineering  Process stages Component analysis ○ What components are required, what are available Requirements modification ○ Not exactly what you need is found, so would you use that or modify your requirements? System design with reuse ○ Design the system in a way so that others are able to reuse your system Development and integration ○ Combining all of the reusable components Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 16
  • 17. Benefits of CBSE  Quick development  Low cost Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 17 Drawbacks of CBSE  Mostly never meets requirements  Needs expert knowledge on component analysis, reusability and integration  Less innovation  More or less depends on the pros and cons of the components.
  • 18. Reuse-oriented development Requirements specification Component analysis Development and integ ration System design with reuse Requirements modification System validation 18Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 19. Incremental delivery  An in-between approach that combines waterfall and evolutionary model  Rather than deliver the system as a single delivery, the development and delivery is broken down into increments with each increment delivering part of the required functionality.  User requirements are prioritised and the highest priority requirements are included in early increments.  Once the development of an increment is started, the requirements are frozen though requirements for later increments can continue to evolve. 19Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 20. Incremental delivery Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 20 Valida te increment Develop system increment Design system architectur e Integrate increment Validate system Define outline requirements Assign requirements to increments System incomplete Final system
  • 21. Incremental development advantages  Customer value can be delivered with each increment so system functionality is available earlier.  Early increments act as a prototype to help elicit requirements for later increments.  Lower risk of overall project failure.  The highest priority system services tend to receive the most testing.  User engagement with the system  Accelerated delivery of customer services 21Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 22. Incremental development disadvantages  Increments should be relatively small (20,000 LoCs)  Each increment should provide system functionality  Difficult to map customer’s requirements onto increments of right size  Hard to identify common facilities that are needed for all increments 22Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 23. Incremental development disadvantages  Progress can be hard to judge and problems hard to find because there is no documentation to demonstrate what has been done.  The normal contract may include a specification; without a specification, different forms of contract have to be used.  Without a specification, what is the system being tested against?  Continual change tends to corrupt software structure making it more expensive to change and evolve to meet new requirements. 23Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 24. Spiral development  Process is represented as a spiral rather than as a sequence of activities with backtracking.  Each loop in the spiral represents a phase in the process.  No fixed phases such as specification or design - loops in the spiral are chosen depending on what is required.  Risks are explicitly assessed and resolved throughout the process. 24Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 25. Spiral model of the software process Risk anal ysis Risk anal ysis Risk anal ysis Risk anal ysis Proto- type 1 Prototype 2 Prototype 3 Oper a- tional protoype Concept of Oper ation Simulations , models , benchmar ks S/W requir ements Requir ement validation Design V&V Product design Detailed design Code Unit test Integ ration test Acceptance testService Develop , verify next-level pr oduct Evalua te alterna tives, identify, resolv e risks Deter mine objecti ves, alterna tives and constr aints Plan ne xt phase Integ ration and test plan Development plan Requir ements plan Life-cy cle plan REVIEW 25Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 26. Spiral model sectors  Objective setting Specific objectives for the phase are identified.  Risk assessment and reduction Risks are assessed and activities put in place to reduce the key risks.  Development and validation A development model for the system is chosen which can be any of the generic models.  Planning The project is reviewed and the next phase of the spiral is planned. 26Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 27. Agile methods  Dissatisfaction with the overheads involved in design methods led to the creation of agile methods. These methods:  Focus on the code rather than the design;  Are based on an iterative approach to software development;  Are intended to deliver working software quickly and evolve this quickly to meet changing requirements.  Agile methods are probably best suited to small/medium-sized business systems or PC products. 27Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 28. Principles of agile methods 28Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 29. Problems with agile methods  It can be difficult to keep the interest of customers who are involved in the process.  Team members may be unsuited to the intense involvement that characterises agile methods.  Prioritising changes can be difficult where there are multiple stakeholders.  Maintaining simplicity requires extra work.  Contracts may be a problem as with other approaches to iterative development. 29Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 30. Extreme programming  Perhaps the best-known and most widely used agile method.  Extreme Programming (XP) takes an ‘extreme’ approach to iterative development. New versions may be built several times per day; Increments are delivered to customers every 2 weeks; All tests must be run for every build and the build is only accepted if tests run successfully. 30Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 31. The XP release cycle Breakdown stories to tasks Select user stories for this release Plan release Release software Evaluate system Develop/integ rate/ test software 31Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 32. Extreme programming practices 1 Incremental planning Requirements are recorded on Story Cards and the Stories to be included in a release are determined by the time available and their relative priority. The developers break these Stories into development ŌTasksÕ. Small Releases The minimal useful set of functionality that provides business value is developed first. Releases of the system are frequent and incrementally add functionality to the first release. Simple Design Enough design is carried out to meet the current requirements and no more. Test first development An automated unit test framework is used to write tests for a new piece of functionality before that functionality itself is implemented. Refactoring All developers are expected to refactor the code continuously as soon as possible code improvements are found. This keeps the code simple and maintainable. 32Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 33. Extreme programming practices 2 Pair Programming Developers work in pairs, checking each otherÕs work and providing the support to always do a good job. Collective Ownership The pairs of developers work on all areas of the system, so that no islands of expertise develop and all the developers own all the code. Anyone can change anything. Continuous Integration As soon as work on a task is complete it is integrated into the whole system. After any such integration, all the unit tests in the system must pass. Sustainable pace Large amounts of over-time are not considered acceptable as the net effect is often to reduce code quality and medium term productivity On-site Customer A representative of the end-user of the system (the Customer) should be available full time for the use of the XP team. In an extreme programming process, the customer is a member of the development team and is responsible for bringing system requirements to the team for implementation. 33Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 34. XP and agile principles  Incremental development is supported through small, frequent system releases.  Customer involvement means full-time customer engagement with the team.  People not process through pair programming, collective ownership and a process that avoids long working hours.  Change supported through regular system releases.  Maintaining simplicity through constant refactoring of code. 34Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 35. Requirements scenarios  In XP, user requirements are expressed as scenarios or user stories.  These are written on cards and the development team break them down into implementation tasks. These tasks are the basis of schedule and cost estimates.  The customer chooses the stories for inclusion in the next release based on their priorities and the schedule estimates. 35Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 36. Story card for document downloading Downloading and printing an article First, you select the article that you want froma displayed list.You then have to tell the systemhow you will pay for it - this can either be through a subscription, through a company account or by credit card. After this, you get a copyright formfromthe systemto fill in and, when you have submitted this, the article you want is downloaded onto your computer. You then choose a printer and a copy ofthe article is printed.You tell the systemifprinting has been successful. Ifthe article is a print-only article, you canÕt keep the PDF version so it is automatically deleted fromyour computer. 36Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 37. Testing in XP  Test-first development.  Incremental test development from scenarios.  User involvement in test development and validation.  Automated test harnesses are used to run all component tests each time that a new release is built. 37Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 38. Task cards for document downloading Task 1: Implement principal workflow Task 2: Implement article catalog and selection Task 3: Implement payment collection Payment may be made in 3 different ways.The user selects which way they wish to pay. Ifthe user has a library subscription, then they can input the subscriber key which should be checked by the system.Alternatively, they can input an organisational account number. Ifthis is valid, a debit ofthe cost ofthe article is posted to this account. Finally, they may input a 16 digit credit card number and expiry date.This should be checked for validity and, if valid a debit is posted to that credit card account. 38Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 39. Test case description Test 4:Test credit card validity Input: Astring representing the credit card number and two integers representing the month and year when the card expires Tests: Check that all bytes in the string are digits Check that the month lies between 1 and 12 and the year is greater than or equal to the current year. Using the first 4 digits ofthe credit card number, check that the card issuer is valid by looking up the card issuer table. Check credit card validity by submitting the card number and expiry date information to the card issuer Output: OK or error message indicating that the card is invalid 39Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 40. Test-first development  Writing tests before code clarifies the requirements to be implemented.  Tests are written as programs rather than data so that they can be executed automatically. The test includes a check that it has executed correctly.  All previous and new tests are automatically run when new functionality is added. Thus checking that the new functionality has not introduced errors. 40Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 41. Pair programming  In XP, programmers work in pairs, sitting together to develop code.  This helps develop common ownership of code and spreads knowledge across the team.  It serves as an informal review process as each line of code is looked at by more than 1 person.  It encourages refactoring as the whole team can benefit from this.  Measurements suggest that development productivity with pair programming is similar to that of two people working independently. 41Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 42. Rapid application development  Agile methods have received a lot of attention but other approaches to rapid application development have been used for many years.  These are designed to develop data- intensive business applications and rely on programming and presenting information from a database. 42Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 43. RAD environment tools  Database programming language  Interface generator  Links to office applications  Report generators 43Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 44. A RAD environment DB prog ramming langua ge Interface gener ator Office systems Repor t gener ator Database mana gement system Rapid application development environment 44Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 45. Visual programming with reuse File Edit Views Layout Options Help General Index Menu component Date component Range checking script Tree display component Draw canvas component User prompt component + script 12th January 2 000 3.876 45Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 46. ReferenceReference  Software Engineering by Ian Sommerville, Chapter 4 and 17, 7th Edition. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 46