SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Flow-Oriented Modeling
Represents how data objects are transformed at they
move through the system
A data flow diagram (DFD) is the diagrammatic form
that is used
Considered by many to be an ‘old school’ approach, flow-
oriented modeling continues to provide a view of the
system that is unique—it should be used to supplement
other analysis model elements




                         1
The Flow Model
Every computer-based system is an
information transform ....



              computer
input          based        output
               system




                2
Flow Modeling Notation

         external entity



         process


             data flow


         data store


         3
External Entity
 A producer or consumer of data


Examples: a person, a device, a sensor

Another example: computer-based
system

 Data must always originate somewhere
 and must always be sent to something



                  4
Process
  A data transformer (changes input
  to output)

Examples: compute taxes, determine area,
format report, display graph

 Data must always be processed in some
 way to achieve system function




                   5
Data Flow

Data flows through a system, beginning
as input and be transformed into output.

     base
               compute
                           area
               triangle
    height        area




                  6
Data Stores
         Data is often stored for later use.

             sensor #
                                      sensor #, type,
                        look-up       location, age
                         sensor
report required           data
                                         type,
                                         location, age
                    sensor number


                                    sensor data




                           7
Data Flow Diagramming
                 Guidelines
• All icons must be labeled with meaningful names
• The DFD evolves through a number of levels of
  detail
• Always begin with a context level diagram (also
  called level 0)
• Always show external entities at level 0 and 1



                        8
• The level 0 data flow diagram should depict the
  software/system as a single bubble
• Primary input and output should be carefully
  noted
• Refinement should begin by isolating candidate
  processes, data objects, and data stores to be
  represented at the next level
• All arrows and bubbles should be labeled with
  meaningful names
• Information flow continuity must be maintained
  from level to level
• One bubble at a time should be refined
                                                    9
Constructing a DFD – level 0

• Review the data model to isolate data
  objects and use a grammatical parse to
  determine “operations”
• Determine external entities (producers
  and consumers of data)
• Create a level 0 DFD



                   10
11
12
Constructing a DFD – level 1
• A “grammatical parse” on the narrative that
  describes the context level bubble.
• Isolate all nouns (and noun phrases) and verbs
  (and verb phrases).
• Verbs are processes which are represented as
  bubbles in a subsequent DFD.
• Nouns are external entities / data objects /
  control objects / data store.

                                               13
14
Constructing a DFD – level 2
• Refines the monitor sensors process




                                        15
16
PSPEC
•   The process transform performs password validation at the control panel
    for the SafeHome security function.
•   Process password receives a four-digit password from the interact with
    user function.
•   The password is first compared to the master password stored within the
    system.
•   If the master password matches , [valid id message = true] is passed to the
    message and status display function.
•   If the master password does not match , the four digits are compared to a
    table of secondary passwords (they may be assigned to house guests
    and/or workers who require entry to the home when the owner is not
    present).
•   If the password matches an entry with the table, [valid id message = true]
    is passed to the message and status display function.
•   If there is no match, [valid id message = false] is passed to the message
    and status display function.

                                                                             17

Contenu connexe

Tendances

Uml in software engineering
Uml in software engineeringUml in software engineering
Uml in software engineeringMubashir Jutt
 
DeadLock in Operating-Systems
DeadLock in Operating-SystemsDeadLock in Operating-Systems
DeadLock in Operating-SystemsVenkata Sreeram
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process FrameworkJAINAM KAPADIYA
 
Symbol table in compiler Design
Symbol table in compiler DesignSymbol table in compiler Design
Symbol table in compiler DesignKuppusamy P
 
A generic view of software engineering
A generic view of software engineeringA generic view of software engineering
A generic view of software engineeringInocentshuja Ahmad
 
Object Modeling Techniques
Object Modeling TechniquesObject Modeling Techniques
Object Modeling TechniquesShilpa Wadhwani
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notesSiva Ayyakutti
 
Data Flow Diagram
Data Flow DiagramData Flow Diagram
Data Flow Diagramnethisip13
 
Interaction Modeling
Interaction ModelingInteraction Modeling
Interaction ModelingHemant Sharma
 
Ll(1) Parser in Compilers
Ll(1) Parser in CompilersLl(1) Parser in Compilers
Ll(1) Parser in CompilersMahbubur Rahman
 
Dynamic and Static Modeling
Dynamic and Static ModelingDynamic and Static Modeling
Dynamic and Static ModelingSaurabh Kumar
 
Operating system Dead lock
Operating system Dead lockOperating system Dead lock
Operating system Dead lockKaram Munir Butt
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithmsPiyush Rochwani
 
CS6502 OOAD - Question Bank and Answer
CS6502 OOAD - Question Bank and AnswerCS6502 OOAD - Question Bank and Answer
CS6502 OOAD - Question Bank and AnswerGobinath Subramaniam
 

Tendances (20)

Recognition-of-tokens
Recognition-of-tokensRecognition-of-tokens
Recognition-of-tokens
 
Uml in software engineering
Uml in software engineeringUml in software engineering
Uml in software engineering
 
DeadLock in Operating-Systems
DeadLock in Operating-SystemsDeadLock in Operating-Systems
DeadLock in Operating-Systems
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process Framework
 
Software Engineering Practice
Software Engineering PracticeSoftware Engineering Practice
Software Engineering Practice
 
Symbol table in compiler Design
Symbol table in compiler DesignSymbol table in compiler Design
Symbol table in compiler Design
 
Software process
Software processSoftware process
Software process
 
A generic view of software engineering
A generic view of software engineeringA generic view of software engineering
A generic view of software engineering
 
Object Modeling Techniques
Object Modeling TechniquesObject Modeling Techniques
Object Modeling Techniques
 
Type Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLikeType Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLike
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notes
 
Data Flow Diagram
Data Flow DiagramData Flow Diagram
Data Flow Diagram
 
Object Oriented Design
Object Oriented DesignObject Oriented Design
Object Oriented Design
 
Interaction Modeling
Interaction ModelingInteraction Modeling
Interaction Modeling
 
Ll(1) Parser in Compilers
Ll(1) Parser in CompilersLl(1) Parser in Compilers
Ll(1) Parser in Compilers
 
Dynamic and Static Modeling
Dynamic and Static ModelingDynamic and Static Modeling
Dynamic and Static Modeling
 
Operating system Dead lock
Operating system Dead lockOperating system Dead lock
Operating system Dead lock
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
 
CS6502 OOAD - Question Bank and Answer
CS6502 OOAD - Question Bank and AnswerCS6502 OOAD - Question Bank and Answer
CS6502 OOAD - Question Bank and Answer
 
Chapter 5 Syntax Directed Translation
Chapter 5   Syntax Directed TranslationChapter 5   Syntax Directed Translation
Chapter 5 Syntax Directed Translation
 

En vedette

CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelmohamed khalaf alla mohamedain
 
Software Engineering - Ch8
Software Engineering - Ch8Software Engineering - Ch8
Software Engineering - Ch8Siddharth Ayer
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysisasimnawaz54
 
The Art Of Debugging
The Art Of DebuggingThe Art Of Debugging
The Art Of Debuggingsvilen.ivanov
 
Requirements engineering process in software engineering
Requirements engineering process in software engineeringRequirements engineering process in software engineering
Requirements engineering process in software engineeringPreeti Mishra
 
Modeling Requirements Using Examples
Modeling Requirements Using ExamplesModeling Requirements Using Examples
Modeling Requirements Using ExamplesExcella
 
Requirements Engineering Process
Requirements Engineering ProcessRequirements Engineering Process
Requirements Engineering ProcessJomel Penalba
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysisMahesh Bhalerao
 
Data Modeling PPT
Data Modeling PPTData Modeling PPT
Data Modeling PPTTrinath
 
requirements analysis and design
requirements analysis and designrequirements analysis and design
requirements analysis and designPreeti Mishra
 
Importance of Product Engineering
Importance of Product EngineeringImportance of Product Engineering
Importance of Product EngineeringGlobalLogic, Inc.
 
Rekayasa Perangkat Lunak software design fundamentals
Rekayasa Perangkat Lunak software design fundamentalsRekayasa Perangkat Lunak software design fundamentals
Rekayasa Perangkat Lunak software design fundamentalsListyowatik (Yanie)
 
Lecture 15 requirements modeling - scenario, information and analysis class...
Lecture 15   requirements modeling - scenario, information and analysis class...Lecture 15   requirements modeling - scenario, information and analysis class...
Lecture 15 requirements modeling - scenario, information and analysis class...IIUI
 
Lecture 16 requirements modeling - scenario, information and analysis classes
Lecture 16   requirements modeling - scenario, information and analysis classesLecture 16   requirements modeling - scenario, information and analysis classes
Lecture 16 requirements modeling - scenario, information and analysis classesIIUI
 
Arsitektur desain data pada RPL
Arsitektur desain data pada RPLArsitektur desain data pada RPL
Arsitektur desain data pada RPLari alfian
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)IIUI
 
Lecture 13 requirements modeling - flow & behavior (2)
Lecture 13   requirements modeling - flow &  behavior (2)Lecture 13   requirements modeling - flow &  behavior (2)
Lecture 13 requirements modeling - flow & behavior (2)IIUI
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21koolkampus
 

En vedette (20)

CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
 
Analysis modeling
Analysis modelingAnalysis modeling
Analysis modeling
 
Software Engineering - Ch8
Software Engineering - Ch8Software Engineering - Ch8
Software Engineering - Ch8
 
Analysis modelling
Analysis modellingAnalysis modelling
Analysis modelling
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysis
 
The Art Of Debugging
The Art Of DebuggingThe Art Of Debugging
The Art Of Debugging
 
Requirements engineering process in software engineering
Requirements engineering process in software engineeringRequirements engineering process in software engineering
Requirements engineering process in software engineering
 
Modeling Requirements Using Examples
Modeling Requirements Using ExamplesModeling Requirements Using Examples
Modeling Requirements Using Examples
 
Requirements Engineering Process
Requirements Engineering ProcessRequirements Engineering Process
Requirements Engineering Process
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
 
Data Modeling PPT
Data Modeling PPTData Modeling PPT
Data Modeling PPT
 
requirements analysis and design
requirements analysis and designrequirements analysis and design
requirements analysis and design
 
Importance of Product Engineering
Importance of Product EngineeringImportance of Product Engineering
Importance of Product Engineering
 
Rekayasa Perangkat Lunak software design fundamentals
Rekayasa Perangkat Lunak software design fundamentalsRekayasa Perangkat Lunak software design fundamentals
Rekayasa Perangkat Lunak software design fundamentals
 
Lecture 15 requirements modeling - scenario, information and analysis class...
Lecture 15   requirements modeling - scenario, information and analysis class...Lecture 15   requirements modeling - scenario, information and analysis class...
Lecture 15 requirements modeling - scenario, information and analysis class...
 
Lecture 16 requirements modeling - scenario, information and analysis classes
Lecture 16   requirements modeling - scenario, information and analysis classesLecture 16   requirements modeling - scenario, information and analysis classes
Lecture 16 requirements modeling - scenario, information and analysis classes
 
Arsitektur desain data pada RPL
Arsitektur desain data pada RPLArsitektur desain data pada RPL
Arsitektur desain data pada RPL
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)
 
Lecture 13 requirements modeling - flow & behavior (2)
Lecture 13   requirements modeling - flow &  behavior (2)Lecture 13   requirements modeling - flow &  behavior (2)
Lecture 13 requirements modeling - flow & behavior (2)
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21
 

Similaire à Flow oriented modeling

Introduction to Data Flow Diagram (DFD)
Introduction to Data Flow Diagram (DFD)Introduction to Data Flow Diagram (DFD)
Introduction to Data Flow Diagram (DFD)Gurpreet singh
 
20.project inventry management system
20.project inventry management system20.project inventry management system
20.project inventry management systemLapi Mics
 
DFDs_and_Algorithms.pptx
DFDs_and_Algorithms.pptxDFDs_and_Algorithms.pptx
DFDs_and_Algorithms.pptxAliyahAli19
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Ansh Kashyap
 
Data and functional modeling
Data and functional modelingData and functional modeling
Data and functional modelingSlideshare
 
Data flow diagram(19th march)
Data flow diagram(19th march)Data flow diagram(19th march)
Data flow diagram(19th march)Ravi Shekhar
 
Data Flow Diagram.pptx
Data Flow Diagram.pptxData Flow Diagram.pptx
Data Flow Diagram.pptxtalhajann43
 
Data flow diagram
Data flow diagram Data flow diagram
Data flow diagram Nidhi Sharma
 
Data flow diagrams (2)
Data flow diagrams (2)Data flow diagrams (2)
Data flow diagrams (2)Ujjwal 'Shanu'
 
Common Data Model - A Business Database!
Common Data Model - A Business Database!Common Data Model - A Business Database!
Common Data Model - A Business Database!Pedro Azevedo
 
Common Data Service – A Business Database!
Common Data Service – A Business Database!Common Data Service – A Business Database!
Common Data Service – A Business Database!Pedro Azevedo
 

Similaire à Flow oriented modeling (20)

Dfd final
Dfd finalDfd final
Dfd final
 
Introduction to Data Flow Diagram (DFD)
Introduction to Data Flow Diagram (DFD)Introduction to Data Flow Diagram (DFD)
Introduction to Data Flow Diagram (DFD)
 
Software engineering srs, dfd
Software engineering srs, dfdSoftware engineering srs, dfd
Software engineering srs, dfd
 
20.project inventry management system
20.project inventry management system20.project inventry management system
20.project inventry management system
 
DFDs_and_Algorithms.pptx
DFDs_and_Algorithms.pptxDFDs_and_Algorithms.pptx
DFDs_and_Algorithms.pptx
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)
 
System design
System designSystem design
System design
 
Data Flow Diagrams
Data Flow DiagramsData Flow Diagrams
Data Flow Diagrams
 
Data and functional modeling
Data and functional modelingData and functional modeling
Data and functional modeling
 
DFD ppt
DFD pptDFD ppt
DFD ppt
 
Data flow diagram
Data flow diagramData flow diagram
Data flow diagram
 
Data flow diagram(19th march)
Data flow diagram(19th march)Data flow diagram(19th march)
Data flow diagram(19th march)
 
Data Flow Diagram.pptx
Data Flow Diagram.pptxData Flow Diagram.pptx
Data Flow Diagram.pptx
 
Data flow diagram
Data flow diagram Data flow diagram
Data flow diagram
 
Data and process modeling
Data and process modelingData and process modeling
Data and process modeling
 
Data flow diagrams (2)
Data flow diagrams (2)Data flow diagrams (2)
Data flow diagrams (2)
 
Common Data Model - A Business Database!
Common Data Model - A Business Database!Common Data Model - A Business Database!
Common Data Model - A Business Database!
 
Dfd2
Dfd2Dfd2
Dfd2
 
DFD Concept
DFD ConceptDFD Concept
DFD Concept
 
Common Data Service – A Business Database!
Common Data Service – A Business Database!Common Data Service – A Business Database!
Common Data Service – A Business Database!
 

Flow oriented modeling

  • 1. Flow-Oriented Modeling Represents how data objects are transformed at they move through the system A data flow diagram (DFD) is the diagrammatic form that is used Considered by many to be an ‘old school’ approach, flow- oriented modeling continues to provide a view of the system that is unique—it should be used to supplement other analysis model elements 1
  • 2. The Flow Model Every computer-based system is an information transform .... computer input based output system 2
  • 3. Flow Modeling Notation external entity process data flow data store 3
  • 4. External Entity A producer or consumer of data Examples: a person, a device, a sensor Another example: computer-based system Data must always originate somewhere and must always be sent to something 4
  • 5. Process A data transformer (changes input to output) Examples: compute taxes, determine area, format report, display graph Data must always be processed in some way to achieve system function 5
  • 6. Data Flow Data flows through a system, beginning as input and be transformed into output. base compute area triangle height area 6
  • 7. Data Stores Data is often stored for later use. sensor # sensor #, type, look-up location, age sensor report required data type, location, age sensor number sensor data 7
  • 8. Data Flow Diagramming Guidelines • All icons must be labeled with meaningful names • The DFD evolves through a number of levels of detail • Always begin with a context level diagram (also called level 0) • Always show external entities at level 0 and 1 8
  • 9. • The level 0 data flow diagram should depict the software/system as a single bubble • Primary input and output should be carefully noted • Refinement should begin by isolating candidate processes, data objects, and data stores to be represented at the next level • All arrows and bubbles should be labeled with meaningful names • Information flow continuity must be maintained from level to level • One bubble at a time should be refined 9
  • 10. Constructing a DFD – level 0 • Review the data model to isolate data objects and use a grammatical parse to determine “operations” • Determine external entities (producers and consumers of data) • Create a level 0 DFD 10
  • 11. 11
  • 12. 12
  • 13. Constructing a DFD – level 1 • A “grammatical parse” on the narrative that describes the context level bubble. • Isolate all nouns (and noun phrases) and verbs (and verb phrases). • Verbs are processes which are represented as bubbles in a subsequent DFD. • Nouns are external entities / data objects / control objects / data store. 13
  • 14. 14
  • 15. Constructing a DFD – level 2 • Refines the monitor sensors process 15
  • 16. 16
  • 17. PSPEC • The process transform performs password validation at the control panel for the SafeHome security function. • Process password receives a four-digit password from the interact with user function. • The password is first compared to the master password stored within the system. • If the master password matches , [valid id message = true] is passed to the message and status display function. • If the master password does not match , the four digits are compared to a table of secondary passwords (they may be assigned to house guests and/or workers who require entry to the home when the owner is not present). • If the password matches an entry with the table, [valid id message = true] is passed to the message and status display function. • If there is no match, [valid id message = false] is passed to the message and status display function. 17