SlideShare une entreprise Scribd logo
1  sur  25
Reengineering Pros and Cons
Neema Volvoikar
162113018
1
Introduction
• When changes are demanded by the end users, the challenge
of software maintenance begins.
• Growing queue of bug fixes, adaptation requests, and outright
enhancements that must be planned, scheduled, and
ultimately accomplished.
• The queue has grown long and the work it implies threatens
to overwhelm the available resources.
• As time passes, your organization finds that it’s spending
more money and time maintaining existing programs than it is
engineering new applications.
2
Software Maintenance
3
It is common for a software organization to expend as much as
60 to 70 percent of all resources on software maintenance.
Legacy system
• Legacy systems are the old software systems which are
essential for business process support.
• Software re-engineering is concerned with re-implementing
legacy systems to make them more maintainable.
• It is the only viable way to ensure that legacy systems can
continue in service.
4
Reengineering
Reengineering occurs at two different level of abstraction
• Business level: A business process is “a set of logically related
tasks performed to achieve a defined business outcome”.
• Software level
5
Business re-engineering process
6
Figure: A BRP Model
Software Reengineering
7
Figure 3: A general model for software re-engineering
Software re-engineering is the examination and the
alteration of a system to reconstitute it in a new form to
improve the maintainability of a software system.
Why do we need software Reengineering
• It is sometimes a cost effective option for software evolution.
• Applicable when some (but not all) subsystems of larger
system require frequent maintenance.
• It involves putting in effort to make it easier to maintain.
8
The process model
9
Inventory analysis
• Spreadsheet model containing information providing detailed
description of applications.
Example: size, age, business criticality.
• Deciding for candidate applications based on this factors
allocating resources to them.
• Inventory should be revisited on a regular cycle.
10
Document restructuring
Weak documentation is the trademark of many legacy systems.
• Creating documentation is far too time consuming. It is not
possible to re-create documentation for hundreds of
computer programs.
• Documentation must be updated, but your organization has
limited resources. You’ll use a “document when touched”
approach and is not necessary to fully redocument an
application.
• The system is business critical and must be fully
redocumented. Even in this case, an intelligent approach is to
pare documentation to an essential minimum.
11
Reverse engineering
• Reverse engineering for software is the process of analyzing a
program in an effort to create a representation of the
program at a higher level of abstraction than source code.
• It is a process of design recovery.
• The program itself is unchanged by reverse engineering
process.
• The software source code is usually available as an input.
12
Code restructuring
• The source code is analyzed using a restructuring tool.
• Violations of structured programming constructs are noted
and code is then restructured or even rewritten in a more
modern programming language.
• The resultant restructured code is reviewed and tested to
ensure that no anomalies have been introduced.
• Internal code documentation is updated.
13
Data restructuring
• A program with weak data architecture will be difficult to
adapt and enhance.
• Data restructuring is a full-scale reengineering activity begins
with a reverse engineering activity.
• Current data architecture is dissected, data objects and
attributes are identified, and existing data structures are
reviewed for quality.
• When data structure is weak, the data are reengineered.
• changes to the data will invariably result in either
architectural or code-level changes.
14
Forward reengineering
• Forward Engineering is a traditional technique of moving from
high-level abstractions and logical, implementation-
independent designs to the physical implementation of a
system.
• For example building from a model into an implementation
language.
15
Advantages
There are two key advantages
• Reduced risk: As the software is already existing, the risk is
less as compared to developing a new software.
• Reduced cost: The cost of engineering is significantly less than
the cost of developing a new software.
16
Re-engineering risks
17
These potential risks can be categorized in the following areas
as depicted below
User satisfaction
• Customer satisfaction is an integral key element for any
business strategy, therefore it is essential for any business to
effectively manage reliable measures for customer
satisfaction.
User satisfaction risks are as below :
• Lack of user friendliness
• Budget overflow in un-managed processes
• Unexpected result of the target system
18
Cost
• Legacy software is reengineered in order to face the market
with latest technology and tools to make it more cost
benefitted.
Risks involved in cost benefit are as follow below:
• Less benefit from the cost of re-engineering
• High maintenance cost after re-engineering
• Expensive backup.
• High cost to finance report
• Poor quality processes for re-engineering and inconsistency of
business plans
• Loss of investments on legacy transformation.
19
Forward engineering
Risks involved in FE are listed as follow.
• Captured objects do not integrate to new system.
• Difficulty in migrating existing data to for new system
• Degree of preparation for transformation and reverse
engineering are not sufficient.
20
Reverse engineering
The RE risk factors are:
• Abstract information cannot be expressed in the designed
language for requirements and design specifications.
• It is quite difficult to capture efficient design and few
requirements from the source code.
• Existing business knowledge embedded in source code is lost
due to inappropriate processes.
• Recovered information is not useful or not used at all.
21
Performance
The Performance risks factors are listed below.
• Non portability in new system
• Result not matched with the previous system
• Reliability mismatch
• Inappropriate Re-engineering approach and data
restructuring.
22
Maintenance
• Decisions are aided by understanding what happens to any
software systems over time according to new requirements.
• The key software maintenance issues can be either
managerial or technical or both.
The maintenance risks are listed as follow.
• Scheduled Backup
• Recovery of legacy systems
• Improper Re-documentation and data restructuring
23
References
• Nasir Rashid Department of CS and I.T University of Malakand
Pakistan, Analysis of Risks in Re-Engineering Software
Systems, Pakistan International Journal of Computer
Applications (0975 – 8887) Volume 73– No.11, July 2013
• Roger S. Pressman, Software Engineering A Practitioner’s
Approach (Seventh Editiion), McGraw-Hill Education.
24
THANK YOU!
25

Contenu connexe

Tendances

Case Study Research in Software Engineering
Case Study Research in Software EngineeringCase Study Research in Software Engineering
Case Study Research in Software Engineeringalessio_ferrari
 
Software Engineering ppt
Software Engineering pptSoftware Engineering ppt
Software Engineering pptshruths2890
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal lawHamza Cheema
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management systemPooja Dixit
 
Introduction to Software Project Management
Introduction to Software Project ManagementIntroduction to Software Project Management
Introduction to Software Project ManagementReetesh Gupta
 
Lecture 02 Software Process Model
Lecture 02 Software Process ModelLecture 02 Software Process Model
Lecture 02 Software Process ModelAchmad Solichin
 
System development life cycle (sdlc)
System development life cycle (sdlc)System development life cycle (sdlc)
System development life cycle (sdlc)Mukund Trivedi
 
11 system development models
11 system development models11 system development models
11 system development modelsmeenakshi24
 
A presentation on forward engineering
A presentation on forward engineeringA presentation on forward engineering
A presentation on forward engineeringGTU
 
System Development Life Cycle (SDLC), Types of SDLC | Waterfall Model and Spi...
System Development Life Cycle (SDLC), Types of SDLC | Waterfall Model and Spi...System Development Life Cycle (SDLC), Types of SDLC | Waterfall Model and Spi...
System Development Life Cycle (SDLC), Types of SDLC | Waterfall Model and Spi...Uttar Tamang ✔
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)fentrekin
 

Tendances (20)

software characteristics
software characteristicssoftware characteristics
software characteristics
 
Case Study Research in Software Engineering
Case Study Research in Software EngineeringCase Study Research in Software Engineering
Case Study Research in Software Engineering
 
Software Engineering ppt
Software Engineering pptSoftware Engineering ppt
Software Engineering ppt
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management system
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Introduction to Software Project Management
Introduction to Software Project ManagementIntroduction to Software Project Management
Introduction to Software Project Management
 
Software Evolution
Software EvolutionSoftware Evolution
Software Evolution
 
Lecture 02 Software Process Model
Lecture 02 Software Process ModelLecture 02 Software Process Model
Lecture 02 Software Process Model
 
System development life cycle (sdlc)
System development life cycle (sdlc)System development life cycle (sdlc)
System development life cycle (sdlc)
 
11 system development models
11 system development models11 system development models
11 system development models
 
Software requirements
Software requirementsSoftware requirements
Software requirements
 
A presentation on forward engineering
A presentation on forward engineeringA presentation on forward engineering
A presentation on forward engineering
 
System Development Life Cycle (SDLC), Types of SDLC | Waterfall Model and Spi...
System Development Life Cycle (SDLC), Types of SDLC | Waterfall Model and Spi...System Development Life Cycle (SDLC), Types of SDLC | Waterfall Model and Spi...
System Development Life Cycle (SDLC), Types of SDLC | Waterfall Model and Spi...
 
Software engineering
Software engineering Software engineering
Software engineering
 
Software development process models
Software development process modelsSoftware development process models
Software development process models
 
Increment model
Increment modelIncrement model
Increment model
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)
 
Cocomo model
Cocomo modelCocomo model
Cocomo model
 

Similaire à Reengineering pros and cons

Software maintenance real world maintenance cost
Software maintenance real world maintenance costSoftware maintenance real world maintenance cost
Software maintenance real world maintenance costmalathieswaran29
 
Software Project Management
Software Project ManagementSoftware Project Management
Software Project ManagementRamesh Babu
 
Conventional software Management---.pptx
Conventional software Management---.pptxConventional software Management---.pptx
Conventional software Management---.pptxTONY562
 
Software Engineering (Introduction to Software Engineering)
Software Engineering (Introduction to Software Engineering)Software Engineering (Introduction to Software Engineering)
Software Engineering (Introduction to Software Engineering)ShudipPal
 
Enterprise resource planning_system
Enterprise resource planning_systemEnterprise resource planning_system
Enterprise resource planning_systemJithin Zcs
 
340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdf340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdfkrishnaraj714229
 
Software Development Life Cycle - SDLC
Software Development Life Cycle - SDLCSoftware Development Life Cycle - SDLC
Software Development Life Cycle - SDLCShwetha-BA
 
INTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERINGINTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERINGPreeti Mishra
 
Software Maintenance with detailed description
Software Maintenance with detailed descriptionSoftware Maintenance with detailed description
Software Maintenance with detailed descriptionSaileshSingh27
 
Microsoft Dynamics AX Implementation Stabilization Case Studies
Microsoft Dynamics AX Implementation Stabilization Case StudiesMicrosoft Dynamics AX Implementation Stabilization Case Studies
Microsoft Dynamics AX Implementation Stabilization Case Studiesmeritweb
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notesSiva Ayyakutti
 
Bse 3105 lecture 4-software re-engineering
Bse 3105  lecture 4-software re-engineeringBse 3105  lecture 4-software re-engineering
Bse 3105 lecture 4-software re-engineeringAlonzee Tash
 
Ais development strategy
Ais development strategyAis development strategy
Ais development strategyRahat Chowdhury
 
Soft engg introduction and process models
Soft engg introduction and process modelsSoft engg introduction and process models
Soft engg introduction and process modelssnehalkulkarni74
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback systemmsandbhor
 
project planning components.pdf
project planning components.pdfproject planning components.pdf
project planning components.pdfsaman Iftikhar
 

Similaire à Reengineering pros and cons (20)

Unit5.pptx
Unit5.pptxUnit5.pptx
Unit5.pptx
 
Software maintenance real world maintenance cost
Software maintenance real world maintenance costSoftware maintenance real world maintenance cost
Software maintenance real world maintenance cost
 
Software Project Management
Software Project ManagementSoftware Project Management
Software Project Management
 
Conventional software Management---.pptx
Conventional software Management---.pptxConventional software Management---.pptx
Conventional software Management---.pptx
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
Software Engineering (Introduction to Software Engineering)
Software Engineering (Introduction to Software Engineering)Software Engineering (Introduction to Software Engineering)
Software Engineering (Introduction to Software Engineering)
 
Enterprise resource planning_system
Enterprise resource planning_systemEnterprise resource planning_system
Enterprise resource planning_system
 
340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdf340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdf
 
Software Development Life Cycle - SDLC
Software Development Life Cycle - SDLCSoftware Development Life Cycle - SDLC
Software Development Life Cycle - SDLC
 
INTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERINGINTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERING
 
Software Maintenance with detailed description
Software Maintenance with detailed descriptionSoftware Maintenance with detailed description
Software Maintenance with detailed description
 
Microsoft Dynamics AX Implementation Stabilization Case Studies
Microsoft Dynamics AX Implementation Stabilization Case StudiesMicrosoft Dynamics AX Implementation Stabilization Case Studies
Microsoft Dynamics AX Implementation Stabilization Case Studies
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notes
 
Bse 3105 lecture 4-software re-engineering
Bse 3105  lecture 4-software re-engineeringBse 3105  lecture 4-software re-engineering
Bse 3105 lecture 4-software re-engineering
 
Outsourcing.ppt
Outsourcing.pptOutsourcing.ppt
Outsourcing.ppt
 
Software Development
Software DevelopmentSoftware Development
Software Development
 
Ais development strategy
Ais development strategyAis development strategy
Ais development strategy
 
Soft engg introduction and process models
Soft engg introduction and process modelsSoft engg introduction and process models
Soft engg introduction and process models
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback system
 
project planning components.pdf
project planning components.pdfproject planning components.pdf
project planning components.pdf
 

Dernier

HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 

Dernier (20)

HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 

Reengineering pros and cons

  • 1. Reengineering Pros and Cons Neema Volvoikar 162113018 1
  • 2. Introduction • When changes are demanded by the end users, the challenge of software maintenance begins. • Growing queue of bug fixes, adaptation requests, and outright enhancements that must be planned, scheduled, and ultimately accomplished. • The queue has grown long and the work it implies threatens to overwhelm the available resources. • As time passes, your organization finds that it’s spending more money and time maintaining existing programs than it is engineering new applications. 2
  • 3. Software Maintenance 3 It is common for a software organization to expend as much as 60 to 70 percent of all resources on software maintenance.
  • 4. Legacy system • Legacy systems are the old software systems which are essential for business process support. • Software re-engineering is concerned with re-implementing legacy systems to make them more maintainable. • It is the only viable way to ensure that legacy systems can continue in service. 4
  • 5. Reengineering Reengineering occurs at two different level of abstraction • Business level: A business process is “a set of logically related tasks performed to achieve a defined business outcome”. • Software level 5
  • 7. Software Reengineering 7 Figure 3: A general model for software re-engineering Software re-engineering is the examination and the alteration of a system to reconstitute it in a new form to improve the maintainability of a software system.
  • 8. Why do we need software Reengineering • It is sometimes a cost effective option for software evolution. • Applicable when some (but not all) subsystems of larger system require frequent maintenance. • It involves putting in effort to make it easier to maintain. 8
  • 10. Inventory analysis • Spreadsheet model containing information providing detailed description of applications. Example: size, age, business criticality. • Deciding for candidate applications based on this factors allocating resources to them. • Inventory should be revisited on a regular cycle. 10
  • 11. Document restructuring Weak documentation is the trademark of many legacy systems. • Creating documentation is far too time consuming. It is not possible to re-create documentation for hundreds of computer programs. • Documentation must be updated, but your organization has limited resources. You’ll use a “document when touched” approach and is not necessary to fully redocument an application. • The system is business critical and must be fully redocumented. Even in this case, an intelligent approach is to pare documentation to an essential minimum. 11
  • 12. Reverse engineering • Reverse engineering for software is the process of analyzing a program in an effort to create a representation of the program at a higher level of abstraction than source code. • It is a process of design recovery. • The program itself is unchanged by reverse engineering process. • The software source code is usually available as an input. 12
  • 13. Code restructuring • The source code is analyzed using a restructuring tool. • Violations of structured programming constructs are noted and code is then restructured or even rewritten in a more modern programming language. • The resultant restructured code is reviewed and tested to ensure that no anomalies have been introduced. • Internal code documentation is updated. 13
  • 14. Data restructuring • A program with weak data architecture will be difficult to adapt and enhance. • Data restructuring is a full-scale reengineering activity begins with a reverse engineering activity. • Current data architecture is dissected, data objects and attributes are identified, and existing data structures are reviewed for quality. • When data structure is weak, the data are reengineered. • changes to the data will invariably result in either architectural or code-level changes. 14
  • 15. Forward reengineering • Forward Engineering is a traditional technique of moving from high-level abstractions and logical, implementation- independent designs to the physical implementation of a system. • For example building from a model into an implementation language. 15
  • 16. Advantages There are two key advantages • Reduced risk: As the software is already existing, the risk is less as compared to developing a new software. • Reduced cost: The cost of engineering is significantly less than the cost of developing a new software. 16
  • 17. Re-engineering risks 17 These potential risks can be categorized in the following areas as depicted below
  • 18. User satisfaction • Customer satisfaction is an integral key element for any business strategy, therefore it is essential for any business to effectively manage reliable measures for customer satisfaction. User satisfaction risks are as below : • Lack of user friendliness • Budget overflow in un-managed processes • Unexpected result of the target system 18
  • 19. Cost • Legacy software is reengineered in order to face the market with latest technology and tools to make it more cost benefitted. Risks involved in cost benefit are as follow below: • Less benefit from the cost of re-engineering • High maintenance cost after re-engineering • Expensive backup. • High cost to finance report • Poor quality processes for re-engineering and inconsistency of business plans • Loss of investments on legacy transformation. 19
  • 20. Forward engineering Risks involved in FE are listed as follow. • Captured objects do not integrate to new system. • Difficulty in migrating existing data to for new system • Degree of preparation for transformation and reverse engineering are not sufficient. 20
  • 21. Reverse engineering The RE risk factors are: • Abstract information cannot be expressed in the designed language for requirements and design specifications. • It is quite difficult to capture efficient design and few requirements from the source code. • Existing business knowledge embedded in source code is lost due to inappropriate processes. • Recovered information is not useful or not used at all. 21
  • 22. Performance The Performance risks factors are listed below. • Non portability in new system • Result not matched with the previous system • Reliability mismatch • Inappropriate Re-engineering approach and data restructuring. 22
  • 23. Maintenance • Decisions are aided by understanding what happens to any software systems over time according to new requirements. • The key software maintenance issues can be either managerial or technical or both. The maintenance risks are listed as follow. • Scheduled Backup • Recovery of legacy systems • Improper Re-documentation and data restructuring 23
  • 24. References • Nasir Rashid Department of CS and I.T University of Malakand Pakistan, Analysis of Risks in Re-Engineering Software Systems, Pakistan International Journal of Computer Applications (0975 – 8887) Volume 73– No.11, July 2013 • Roger S. Pressman, Software Engineering A Practitioner’s Approach (Seventh Editiion), McGraw-Hill Education. 24