SE Notes
SE Notes
net/publication/344375143
CITATIONS READS
0 294
1 author:
Ghulam Gilanie
The Islamia University of Bahawalpur
112 PUBLICATIONS 371 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ghulam Gilanie on 25 September 2020.
0300-2038128 Page | 1
Compiled by Dr. Ghulam Gilanie Janjua
Software Evolution
The process of developing a software product using software engineering principles and
methods is referred to as software evolution. This includes the initial development of
software and its maintenance and updates, till desired software product is developed,
which satisfies the expected requirements.
Evolution starts from the requirement gathering process. After which developers create
a prototype of the intended software and show it to the users to get their feedback at the
early stage of software product development. The users suggest changes, on which
several consecutive updates and maintenance keep on changing too. This process
changes to the original software, till the desired software is accomplished.
Even after the user has desired software in hand, the advancing technology and the
changing requirements force the software product to change accordingly. Re-creating
software from scratch and to go one-on-one with requirement is not feasible. The only
feasible and economical solution is to update the existing software so that it matches the
latest requirements.
0300-2038128 Page | 2
Compiled by Dr. Ghulam Gilanie Janjua
E-type (embedded-type) - This software works closely as the requirement of
real-world environment. This software has a high degree of evolution as there are
various changes in laws, taxes etc. in the real world situations. For example,
Online trading software.
Software Paradigms
Software paradigms refer to the methods and steps, which are taken while designing the
software. There are many methods proposed and are in work today, but we need to see
where in the software engineering these paradigms stand. These can be combined into
various categories, though each of them is contained in one another:
0300-2038128 Page | 3
Compiled by Dr. Ghulam Gilanie Janjua
This Paradigm is known as software engineering paradigms where all the engineering
concepts pertaining to the development of software are applied. It includes various
researches and requirement gathering which helps the software product to build. It
consists of –
Requirement gathering
Software design
Programming
Design
Maintenance
Programming
Programming Paradigm
0300-2038128 Page | 4
Compiled by Dr. Ghulam Gilanie Janjua
Coding
Testing
Integration
Operational
Transitional
Maintenance
Well-engineered and crafted software is expected to have the following characteristics:
Operational
This tells us how well software works in operations. It can be measured on:
Budget
Usability
Efficiency
0300-2038128 Page | 5
Compiled by Dr. Ghulam Gilanie Janjua
Correctness
Functionality
Dependability
Security
Safety
Transitional
This aspect is important when the software is moved from one platform to another:
Portability
Interoperability
Reusability
Adaptability
Maintenance
This aspect briefs about how well a software has the capabilities to maintain itself in the
ever-changing environment:
Modularity
Maintainability
Flexibility
Scalability
In short, Software engineering is a branch of computer science, which uses well-defined
engineering concepts required to produce efficient, durable, scalable, in-budget and on-
time software products.
This is the first step where the user initiates the request for a desired software product.
He contacts the service provider and tries to negotiate the terms. He submits his request
to the service providing organization in writing.
Requirement Gathering
This step onwards the software development team works to carry on the project. The
team holds discussions with various stakeholders from problem domain and tries to bring
out as much information as possible on their requirements. The requirements are
contemplated and segregated into user requirements, system requirements and
0300-2038128 Page | 6
Compiled by Dr. Ghulam Gilanie Janjua
functional requirements. The requirements are collected using a number of practices as
given -
Feasibility Study
After requirement gathering, the team comes up with a rough plan of software process.
At this step the team analyzes if a software can be made to fulfill all requirements of the
user and if there is any possibility of software being no more useful. It is found out, if the
project is financially, practically and technologically feasible for the organization to take
up. There are many algorithms available, which help the developers to conclude the
feasibility of a software project.
System Analysis
At this step the developers decide a roadmap of their plan and try to bring up the best
software model suitable for the project. System analysis includes Understanding of
software product limitations, learning system related problems or changes to be done in
existing systems beforehand, identifying and addressing the impact of project on
organization and personnel etc. The project team analyzes the scope of the project and
plans the schedule and resources accordingly.
Software Design
Next step is to bring down whole knowledge of requirements and analysis on the desk
and design the software product. The inputs from users and information gathered in
requirement gathering phase are the inputs of this step. The output of this step comes in
the form of two designs; logical design and physical design. Engineers produce meta-
data and data dictionaries, logical diagrams, data-flow diagrams and in some cases
pseudo codes.
Coding
This step is also known as programming phase. The implementation of software design
starts in terms of writing program code in the suitable programming language and
developing error-free executable programs efficiently.
Testing
An estimate says that 50% of whole software development process should be tested.
Errors may ruin the software from critical level to its own removal. Software testing is
0300-2038128 Page | 7
Compiled by Dr. Ghulam Gilanie Janjua
done while coding by the developers and thorough testing is conducted by testing
experts at various levels of code such as module testing, program testing, product
testing, in-house testing and testing the product at user’s end. Early discovery of errors
and their remedy is the key to reliable software.
Integration
Software may need to be integrated with the libraries, databases and other program(s).
This stage of SDLC is involved in the integration of software with outer world entities.
Implementation
This means installing the software on user machines. At times, software needs post-
installation configurations at user end. Software is tested for portability and adaptability
and integration related issues are solved during implementation.
This phase confirms the software operation in terms of more efficiency and less errors.
If required, the users are trained on, or aided with the documentation on how to operate
the software and how to keep the software operational. The software is maintained timely
by updating the code according to the changes taking place in user end environment or
technology. This phase may face challenges from hidden bugs and real-world
unidentified problems.
Disposition
As time elapses, the software may decline on the performance front. It may go
completely obsolete or may need intense upgradation. Hence a pressing need to
eliminate a major portion of the system arises. This phase includes archiving data and
required software components, closing down the system, planning disposition activity
and terminating system at appropriate end-of-system time.
Software Creation
Software Project Management
A project is well-defined task, which is a collection of several operations done in order to
achieve a goal (for example, software development and delivery). A Project can be
characterized as:
0300-2038128 Page | 8
Compiled by Dr. Ghulam Gilanie Janjua
Project comes with a start time and end time.
Project ends when its goal is achieved hence it is a temporary phase in the
lifetime of an organization.
Project needs adequate resources in terms of time, manpower, finance, material
and knowledge-bank.
Software Project
A Software Project is the complete procedure of software development from requirement
gathering to testing and maintenance, carried out according to the execution
methodologies, in a specified period to achieve intended software product.
The image above shows triple constraints for software projects. It is an essential part of
software organization to deliver quality product, keeping the cost within client’s budget
constrain and deliver the project as per scheduled. There are several factors, both
internal and external, which may impact this triple constrain triangle. Any of three factor
can severely impact the other two.
Therefore, software project management is essential to incorporate user requirements
along with budget and time constraints.
0300-2038128 Page | 9
Compiled by Dr. Ghulam Gilanie Janjua
SDLC that the software would go through. Project manager may never directly involve
in producing the end product but he controls and manages the activities involved in
production.
A project manager closely monitors the development process, prepares and executes
various plans, arranges necessary and adequate resources, maintains communication
among all team members in order to address issues of cost, budget, resources, time,
quality and customer satisfaction.
Let us see few responsibilities that a project manager shoulders -
Managing People
Managing Project
Project Planning
Scope Management
Project Estimation
Project Planning
Software project planning is task, which is performed before the production of software
actually starts. It is there for the software production but involves no concrete activity that
has any direction connection with software production; rather it is a set of multiple
0300-2038128 Page | 10
Compiled by Dr. Ghulam Gilanie Janjua
processes, which facilitates software production. Project planning may include the
following:
Scope Management
It defines the scope of project; this includes all the activities, process need to be done in
order to make a deliverable software product. Scope management is essential because
it creates boundaries of the project by clearly defining what would be done in the project
and what would not be done. This makes project to contain limited and quantifiable tasks,
which can easily be documented and in turn avoids cost and time overrun.
During Project Scope management, it is necessary to -
Project Estimation
For an effective management accurate estimation of various measures is a must. With
correct estimation managers can manage and control the project more efficiently and
effectively.
Project estimation may involve the following:
Effort estimation
The managers estimate efforts in terms of personnel requirement and man-hour
required to produce the software. For effort estimation software size should be
known. This can either be derived by managers’ experience, organization’s
historical data or software size can be converted into efforts by using some
standard formulae.
Time estimation
Once size and efforts are estimated, the time required to produce the software
can be estimated. Efforts required is segregated into sub categories as per the
requirement specifications and interdependency of various components of
software. Software tasks are divided into smaller tasks, activities or events by
0300-2038128 Page | 11
Compiled by Dr. Ghulam Gilanie Janjua
Work Breakthrough Structure (WBS). The tasks are scheduled on day-to-day
basis or in calendar months.
The sum of time required to complete all tasks in hours or days is the total time
invested to complete the project.
Cost estimation
This might be considered as the most difficult of all because it depends on more
elements than any of the previous ones. For estimating project cost, it is required
to consider -
o Size of software
o Software quality
o Hardware
o Additional software or tools, licenses etc.
o Skilled personnel with task-specific skills
o Travel involved
o Communication
o Training and support
Decomposition Technique
This technique uses empirically derived formulae to make estimation. These formulae
are based on LOC or FPs.
Putnam Model
0300-2038128 Page | 12
Compiled by Dr. Ghulam Gilanie Janjua
This model is made by Lawrence H. Putnam, which is based on Norden’s
frequency distribution (Rayleigh curve). Putnam model maps time and efforts
required with software size.
COCOMO
COCOMO stands for COnstructive COst MOdel, developed by Barry W. Boehm.
It divides the software product into three categories of software: organic, semi-
detached and embedded.
Project Scheduling
Project Scheduling in a project refers to roadmap of all activities to be done with specified
order and within time slot allotted to each activity. Project managers tend to define
various tasks, and project milestones and arrange them keeping various factors in mind.
They look for tasks lie in critical path in the schedule, which are necessary to complete
in specific manner (because of task interdependency) and strictly within the time
allocated. Arrangement of tasks which lies out of critical path are less likely to impact
over all schedule of the project.
For scheduling a project, it is necessary to -
Resource management
All elements used to develop a software product may be assumed as resource for that
project. This may include human resource, productive tools and software libraries.
The resources are available in limited quantity and stay in the organization as a pool of
assets. The shortage of resources hampers the development of project and it can lag
behind the schedule. Allocating extra resources increases development cost in the end.
It is therefore necessary to estimate and allocate adequate resources for the project.
Resource management includes -
0300-2038128 Page | 13
Compiled by Dr. Ghulam Gilanie Janjua
Project Risk Management
Risk management involves all activities pertaining to identification, analyzing and making
provision for predictable and non-predictable risks in the project. Risk may include the
following:
Experienced staff leaving the project and new staff coming in.
Change in organizational management.
Requirement change or misinterpreting requirement.
Under-estimation of required time and resources.
Technological changes, environmental changes, business competition.
Identification - Make note of all possible risks, which may occur in the project.
Categorize - Categorize known risks into high, medium and low risk intensity as
per their possible impact on the project.
Manage - Analyze the probability of occurrence of risks at various phases. Make
plan to avoid or face risks. Attempt to minimize their side-effects.
Monitor - Closely monitor the potential risks and their early symptoms. Also
monitor the effects of steps taken to mitigate or avoid them.
Activity Monitoring - All activities scheduled within some task can be monitored
on day-to-day basis. When all activities in a task are completed, it is considered
as complete.
Status Reports - The reports contain status of activities and tasks completed
within a given time frame, generally a week. Status can be marked as finished,
pending or work-in-progress etc.
Milestones Checklist - Every project is divided into multiple phases where major
tasks are performed (milestones) based on the phases of SDLC. This milestone
checklist is prepared once every few weeks and reports the status of milestones.
0300-2038128 Page | 14
Compiled by Dr. Ghulam Gilanie Janjua
Project Communication Management
Effective communication plays vital role in the success of a project. It bridges gaps
between client and the organization, among the team members as well as other stake
holders in the project such as hardware suppliers.
Communication can be oral or written. Communication management process may have
the following steps:
Planning - This step includes the identifications of all the stakeholders in the
project and the mode of communication among them. It also considers if any
additional communication facilities are required.
Sharing - After determining various aspects of planning, manager focuses on
sharing correct information with the correct person on correct time. This keeps
every one involved the project up to date with project progress and its status.
Feedback - Project managers use various measures and feedback mechanism
and create status and performance reports. This mechanism ensures that input
from various stakeholders is coming to the project manager as their feedback.
Closure - At the end of each major event, end of a phase of SDLC or end of the
project itself, administrative closure is formally announced to update every
stakeholder by sending email, by distributing a hardcopy of document or by other
mean of effective communication.
After closure, the team moves to next phase or project.
Configuration Management
Configuration management is a process of tracking and controlling the changes in
software in terms of the requirements, design, functions and development of the product.
IEEE defines it as “the process of identifying and defining the items in the system,
controlling the change of these items throughout their life cycle, recording and reporting
the status of items and change requests, and verifying the completeness and
correctness of items”.
Generally, once the SRS is finalized there is less chance of requirement of changes from
user. If they occur, the changes are addressed only with prior approval of higher
management, as there is a possibility of cost and time overrun.
Baseline
0300-2038128 Page | 15
Compiled by Dr. Ghulam Gilanie Janjua
Configuration management is a discipline of organization administration, which takes
care of occurrence of any change (process, requirement, technological, strategical etc.)
after a phase is baselined. CM keeps check on any changes done in software.
Change Control
Change control is function of configuration management, which ensures that all changes
made to software system are consistent and made as per organizational rules and
regulations.
A change in the configuration of product goes through following steps -
Identification - A change request arrives from either internal or external source.
When change request is identified formally, it is properly documented.
Validation - Validity of the change request is checked and its handling procedure
is confirmed.
Analysis - The impact of change request is analyzed in terms of schedule, cost
and required efforts. Overall impact of the prospective change on system is
analyzed.
Control - If the prospective change either impacts too many entities in the system
or it is unavoidable, it is mandatory to take approval of high authorities before
change is incorporated into the system. It is decided if the change is worth
incorporation or not. If it is not, change request is refused formally.
Execution - If the previous phase determines to execute the change request, this
phase take appropriate actions to execute the change, does a thorough revision
if necessary.
Close request - The change is verified for correct implementation and merging
with the rest of the system. This newly incorporated change in the software is
documented properly and the request is formally is closed.
Gantt Chart
Gantt charts was devised by Henry Gantt (1917). It represents project schedule with
respect to time periods. It is a horizontal bar chart with bars representing activities and
time scheduled for the project activities.
0300-2038128 Page | 16
Compiled by Dr. Ghulam Gilanie Janjua
PERT Chart
PERT (Program Evaluation & Review Technique) chart is a tool that depicts project as
network diagram. It is capable of graphically representing main events of project in both
parallel and consecutive way. Events, which occur one after another, show dependency
of the later event over the previous one.
Events are shown as numbered nodes. They are connected by labeled arrows depicting
sequence of tasks in the project.
Resource Histogram
This is a graphical tool that contains bar or chart representing number of resources
(usually skilled staff) required over time for a project event (or phase). Resource
Histogram is an effective tool for staff planning and coordination.
0300-2038128 Page | 17
Compiled by Dr. Ghulam Gilanie Janjua
This tool is useful in recognizing interdependent tasks in the project. It also helps to find
out the shortest path or critical path to complete the project successfully. Like PERT
diagram, each event is allotted a specific period. This tool shows dependency of event
assuming an event can proceed to next only if the previous one is completed.
The events are arranged according to their earliest possible start time. Path between
start and end node is critical path which cannot be further reduced and all events require
to be executed in same order.
Software Requirements
The software requirements are description of features and functionalities of the target
system. Requirements convey the expectations of users from the software product. The
requirements can be obvious or hidden, known or unknown, expected or unexpected
from client’s point of view.
Requirement Engineering
0300-2038128 Page | 18
Compiled by Dr. Ghulam Gilanie Janjua
The process to gather the software requirements from client, analyze and document
them is known as requirement engineering.
The goal of requirement engineering is to develop and maintain sophisticated and
descriptive ‘System Requirements Specification’ document.
Feasibility Study
Requirement Gathering
Software Requirement Specification
Software Requirement Validation
Let us see the process briefly -
Feasibility study
When the client approaches the organization for getting the desired product developed,
it comes up with rough idea about what all functions the software must perform and which
all features are expected from the software.
Referencing to this information, the analysts does a detailed study about whether the
desired system and its functionality are feasible to develop.
This feasibility study is focused towards goal of the organization. This study analyzes
whether the software product can be practically materialized in terms of implementation,
contribution of project to organization, cost constraints and as per values and objectives
of the organization. It explores technical aspects of the project and product such as
usability, maintainability, productivity and integration ability.
The output of this phase should be a feasibility study report that should contain adequate
comments and recommendations for management about whether or not the project
should be undertaken.
Requirement Gathering
If the feasibility report is positive towards undertaking the project, next phase starts with
gathering requirements from the user. Analysts and engineers communicate with the
client and end-users to know their ideas on what the software should provide and which
features they want the software to include.
SRS is a document created by system analyst after the requirements are collected from
various stakeholders.
0300-2038128 Page | 19
Compiled by Dr. Ghulam Gilanie Janjua
SRS defines how the intended software will interact with hardware, external interfaces,
speed of operation, response time of system, portability of software across various
platforms, maintainability, speed of recovery after crashing, Security, Quality, Limitations
etc.
The requirements received from client are written in natural language. It is the
responsibility of system analyst to document the requirements in technical language so
that they can be comprehended and useful by the software development team.
SRS should come up with following features:
Requirements gathering - The developers discuss with the client and end users
and know their expectations from the software.
Organizing Requirements - The developers prioritize and arrange the
requirements in order of importance, urgency and convenience.
Negotiation & discussion - If requirements are ambiguous or there are some
conflicts in requirements of various stakeholders, if they are, it is then negotiated
0300-2038128 Page | 20
Compiled by Dr. Ghulam Gilanie Janjua
and discussed with stakeholders. Requirements may then be prioritized and
reasonably compromised.
The requirements come from various stakeholders. To remove the ambiguity and
conflicts, they are discussed for clarity and correctness. Unrealistic requirements
are compromised reasonably.
Interviews
Interviews are strong medium to collect requirements. Organization may conduct several
types of interviews such as:
Surveys
Organization may conduct surveys among various stakeholders by querying about their
expectation and requirements from the upcoming system.
Questionnaires
A document with pre-defined set of objective questions and respective options is handed
over to all stakeholders to answer, which are collected and compiled.
A shortcoming of this technique is, if an option for some issue is not mentioned in the
questionnaire, the issue might be left unattended.
0300-2038128 Page | 21
Compiled by Dr. Ghulam Gilanie Janjua
Task analysis
Team of engineers and developers may analyze the operation for which the new system
is required. If the client already has some software to perform certain operation, it is
studied and requirements of proposed system are collected.
Domain Analysis
Every software falls into some domain category. The expert people in the domain can
be a great help to analyze general and specific requirements.
Brainstorming
An informal debate is held among various stakeholders and all their inputs are recorded
for further requirements analysis.
Prototyping
Prototyping is building user interface without adding detail functionality for user to
interpret the features of intended software product. It helps giving better idea of
requirements. If there is no software installed at client’s end for developer’s reference
and the client is not aware of its own requirements, the developer creates a prototype
based on initially mentioned requirements. The prototype is shown to the client and the
feedback is noted. The client feedback serves as an input for requirement gathering.
Observation
Team of experts visit the client’s organization or workplace. They observe the actual
working of the existing installed systems. They observe the workflow at client’s end and
how execution problems are dealt. The team itself draws some conclusions which aid to
form requirements expected from the software.
Clear
Correct
Consistent
Coherent
Comprehensible
Modifiable
0300-2038128 Page | 22
Compiled by Dr. Ghulam Gilanie Janjua
Verifiable
Prioritized
Unambiguous
Traceable
Credible source
Software Requirements
We should try to understand what sort of requirements may arise in the requirement
elicitation phase and what kinds of requirements are expected from the software system.
Broadly software requirements should be categorized in two categories:
Functional Requirements
Requirements, which are related to functional aspect of software fall into this category.
They define functions and functionality within and from the software system.
Examples -
Non-Functional Requirements
Requirements, which are not related to functional aspect of software, fall into this
category. They are implicit or expected characteristics of software, which users make
assumption of.
Non-functional requirements include -
Security
Logging
Storage
Configuration
Performance
Cost
Interoperability
Flexibility
0300-2038128 Page | 23
Compiled by Dr. Ghulam Gilanie Janjua
Disaster recovery
Accessibility
Requirements are categorized logically as
easy to operate
quick in response
effectively handling operational errors
providing simple yet consistent user interface
User acceptance majorly depends upon how user can use the software. UI is the only
way for users to perceive the system. A well performing software system must also be
equipped with attractive, clear, consistent and responsive user interface. Otherwise the
functionalities of software system can not be used in convenient way. A system is said
be good if it provides means to use it efficiently. User interface requirements are briefly
mentioned below -
Content presentation
Easy Navigation
Simple interface
Responsive
Consistent UI elements
Feedback mechanism
Default settings
Purposeful layout
Strategical use of color and texture.
Provide help information
User centric approach
Group based view settings.
0300-2038128 Page | 24
Compiled by Dr. Ghulam Gilanie Janjua
Software System Analyst
System analyst in an IT organization is a person, who analyzes the requirement of
proposed system and ensures that requirements are conceived and documented
properly & correctly. Role of an analyst starts during Software Analysis Phase of SDLC.
It is the responsibility of analyst to make sure that the developed software meets the
requirements of the client.
System Analysts have the following responsibilities:
0300-2038128 Page | 25
Compiled by Dr. Ghulam Gilanie Janjua
Quality Metrics - Defects, their types and causes, consequence, intensity of
severity and their implications define the quality of product.
The number of defects found in development process and number of defects
reported by the client after the product is installed or delivered at client-end, define
quality of product.
Process Metrics - In various phases of SDLC, the methods and tools used, the
company standards and the performance of development are software process
metrics.
Resource Metrics - Effort, time and various resources used, represents metrics
for resource measurement.
Modularization
0300-2038128 Page | 26
Compiled by Dr. Ghulam Gilanie Janjua
Modularization is a technique to divide a software system into multiple discrete and
independent modules, which are expected to be capable of carrying out task(s)
independently. These modules may work as basic constructs for the entire software.
Designers tend to design modules such that they can be executed and/or compiled
separately and independently.
Modular design unintentionally follows the rules of ‘divide and conquer’ problem-solving
strategy this is because there are many other benefits attached with the modular design
of a software.
Advantage of modularization:
Concurrency
Back in time, all software are meant to be executed sequentially. By sequential execution
we mean that the coded instruction will be executed one after another implying only one
portion of program being activated at any given time. Say, a software has multiple
modules, then only one of all the modules can be found active at any time of execution.
In software design, concurrency is implemented by splitting the software into multiple
independent units of execution, like modules and executing them in parallel. In other
words, concurrency provides capability to the software to execute more than one part of
code in parallel to each other.
It is necessary for the programmers and designers to recognize those modules, which
can be made parallel execution.
Example
The spell check feature in word processor is a module of software, which runs along side
the word processor itself.
0300-2038128 Page | 27
Compiled by Dr. Ghulam Gilanie Janjua
of modules and their interaction among them can be measured. These measures are
called coupling and cohesion.
Cohesion
Cohesion is a measure that defines the degree of intra-dependability within elements of
a module. The greater the cohesion, the better is the program design.
There are seven types of cohesion, namely –
Coupling
Coupling is a measure that defines the level of inter-dependability among modules of a
program. It tells at what level the modules interfere and interact with each other. The
lower the coupling, the better the program.
There are five levels of coupling, namely -
Content coupling - When a module can directly access or modify or refer to the
content of another module, it is called content level coupling.
Common coupling- When multiple modules have read and write access to
some global data, it is called common or global coupling.
0300-2038128 Page | 28
Compiled by Dr. Ghulam Gilanie Janjua
Control coupling- Two modules are called control-coupled if one of them
decides the function of the other module or changes its flow of execution.
Stamp coupling- When multiple modules share common data structure and
work on different part of it, it is called stamp coupling.
Data coupling- Data coupling is when two modules interact with each other by
means of passing data (as parameter). If a module passes data structure as
parameter, then the receiving module should use all its components.
Ideally, no coupling is considered to be the best.
Design Verification
The output of software design process is design documentation, pseudo codes, detailed
logic diagrams, process diagrams, and detailed description of all functional or non-
functional requirements.
The next phase, which is the implementation of software, depends on all outputs
mentioned above.
It is then becomes necessary to verify the output before proceeding to the next phase.
The early any mistake is detected, the better it is or it might not be detected until testing
of the product. If the outputs of design phase are in formal notation form, then their
associated tools for verification should be used otherwise a thorough design review can
be used for verification and validation.
By structured verification approach, reviewers can detect defects that might be caused
by overlooking some conditions. A good design review is important for good software
design, accuracy and quality.
Software Testing
Software Testing is evaluation of the software against requirements gathered from users
and system specifications. Testing is conducted at the phase level in software
development life cycle or at module level in program code. Software testing comprises
of Validation and Verification.
Software Validation
Validation is process of examining whether or not the software satisfies the user
requirements. It is carried out at the end of the SDLC. If the software matches
requirements for which it was made, it is validated.
0300-2038128 Page | 29
Compiled by Dr. Ghulam Gilanie Janjua
Software Verification
Verification is the process of confirming if the software is meeting the business
requirements, and is developed adhering to the proper specifications and
methodologies.
Testing Approaches
Tests can be conducted based on two approaches –
0300-2038128 Page | 30
Compiled by Dr. Ghulam Gilanie Janjua
Functionality testing
Implementation testing
When functionality is being tested without taking the actual implementation in concern it
is known as black-box testing. The other side is known as white-box testing where not
only functionality is tested but the way it is implemented is also analyzed.
Exhaustive tests are the best-desired method for a perfect testing. Every single possible
value in the range of the input and output values is tested. It is not possible to test each
and every value in real world scenario if the range of values is large.
Black-box testing
It is carried out to test functionality of the program. It is also called ‘Behavioral’ testing.
The tester in this case, has a set of input values and respective desired results. On
providing input, if the output matches with the desired results, the program is tested ‘ok’,
and problematic otherwise.
In this testing method, the design and structure of the code are not known to the tester,
and testing engineers and end users conduct this test on the software.
Black-box testing techniques:
Equivalence class - The input is divided into similar classes. If one element of a
class passes the test, it is assumed that all the class is passed.
Boundary values - The input is divided into higher and lower end values. If these
values pass the test, it is assumed that all values in between may pass too.
Cause-effect graphing - In both previous methods, only one input value at a time
is tested. Cause (input) – Effect (output) is a testing technique where
combinations of input values are tested in a systematic way.
Pair-wise Testing - The behavior of software depends on multiple parameters. In
pairwise testing, the multiple parameters are tested pair-wise for their different
values.
State-based testing - The system changes state on provision of input. These
systems are tested based on their states and input.
White-box testing
0300-2038128 Page | 31
Compiled by Dr. Ghulam Gilanie Janjua
It is conducted to test program and its implementation, in order to improve code efficiency
or structure. It is also known as ‘Structural’ testing.
In this testing method, the design and structure of the code are known to the tester.
Programmers of the code conduct this test on the code.
The below are some White-box testing techniques:
Control-flow testing - The purpose of the control-flow testing to set up test cases
which covers all statements and branch conditions. The branch conditions are
tested for both being true and false, so that all statements can be covered.
Data-flow testing - This testing technique emphasis to cover all the data variables
included in the program. It tests where the variables were declared and defined
and where they were used or changed.
Testing Levels
Testing itself may be defined at various levels of SDLC. The testing process runs parallel
to software development. Before jumping on the next stage, a stage is tested, validated
and verified.
Testing separately is done just to make sure that there are no hidden bugs or issues left
in the software. Software is tested on various levels -
Unit Testing
While coding, the programmer performs some tests on that unit of program to know if it
is error free. Testing is performed under white-box testing approach. Unit testing helps
developers decide that individual units of the program are working as per requirement
and are error free.
Integration Testing
Even if the units of software are working fine individually, there is a need to find out if the
units if integrated together would also work without errors. For example, argument
passing and data updation etc.
System Testing
0300-2038128 Page | 32
Compiled by Dr. Ghulam Gilanie Janjua
The software is compiled as product and then it is tested as a whole. This can be
accomplished using one or more of the following tests:
Functionality testing - Tests all functionalities of the software against the
requirement.
Performance testing - This test proves how efficient the software is. It tests the
effectiveness and average time taken by the software to do desired task.
Performance testing is done by means of load testing and stress testing where
the software is put under high user and data load under various environment
conditions.
Security & Portability - These tests are done when the software is meant to work
on various platforms and accessed by number of persons.
Acceptance Testing
When the software is ready to hand over to the customer it has to go through last phase
of testing where it is tested for user-interaction and response. This is important because
even if the software matches all user requirements and if user does not like the way it
appears or works, it may be rejected.
Alpha testing - The team of developer themselves perform alpha testing by using
the system as if it is being used in work environment. They try to find out how user
would react to some action in software and how the system should respond to
inputs.
Beta testing - After the software is tested internally, it is handed over to the users
to use it under their production environment only for testing purpose. This is not
as yet the delivered product. Developers expect that users at this stage will bring
minute problems, which were skipped to attend.
Regression Testing
Testing Documentation
Testing documents are prepared at different stages -
Before Testing
Testing starts with test cases generation. Following documents are needed for reference
–
SRS document - Functional Requirements document
0300-2038128 Page | 33
Compiled by Dr. Ghulam Gilanie Janjua
Test Policy document - This describes how far testing should take place before
releasing the product.
Test Strategy document - This mentions detail aspects of test team,
responsibility matrix and rights/responsibility of test manager and test engineer.
Traceability Matrix document - This is SDLC document, which is related to
requirement gathering process. As new requirements come, they are added to
this matrix. These matrices help testers know the source of requirement. They
can be traced forward and backward.
The following documents may be required while testing is started and is being done:
Test Case document - This document contains list of tests required to be
conducted. It includes Unit test plan, Integration test plan, System test plan and
Acceptance test plan.
Test description - This document is a detailed description of all test cases and
procedures to execute them.
Test case report - This document contains test case report as a result of the test.
Test logs - This document contains test logs for every test case report.
After Testing
0300-2038128 Page | 34
Compiled by Dr. Ghulam Gilanie Janjua
Software audit - This is a review of procedure used by the organization to develop
the software. A team of auditors, independent of development team examines the
software process, procedure, requirements and other aspects of SDLC. The
purpose of software audit is to check that software and its development process,
both conform standards, rules and regulations.
0300-2038128 Page | 35
Compiled by Dr. Ghulam Gilanie Janjua
The objective of this testing is to find the defects and break the application by executing any flow
of the application or any random functionality.
Ad-hoc Testing is an informal way of finding defects and can be performed by anyone in the
project. It is difficult to identify defects without a test case but sometimes it is possible that defects
found during ad-hoc testing might not have been identified using existing test cases.
#4) Accessibility Testing
The aim of Accessibility Testing is to determine whether the software or application is accessible
for disabled people or not.
Here, disability means deaf, color blind, mentally disabled, blind, old age and other disabled
groups. Various checks are performed such as font size for visually disabled, color and contrast
for color blindness, etc.
#5) Beta Testing
Beta Testing is a formal type of Software Testing which is carried out by the customer. It is
performed in the Real Environment before releasing the product to the market for the actual end-
users.
Beta Testing is carried out to ensure that there are no major failures in the software or product and
it satisfies the business requirements from an end-user perspective. Beta Testing is successful when
the customer accepts the software. Usually, this testing is typically done by end-users or others. It
is the final testing done before releasing an application for commercial purpose. Usually, the Beta
version of the software or product released is limited to a certain number of users in a specific area.
So end-user actually uses the software and shares the feedback to the company. Company then
takes necessary action before releasing the software to the worldwide.
#6) Back-end Testing
Whenever an input or data is entered on front-end application, it stores in the database and the
testing of such database is known as Database Testing or Backend Testing. There are different
databases like SQL Server, MySQL, and Oracle, etc. Database Testing involves testing of table
structure, schema, stored procedure, data structure and so on. In Back-end Testing GUI is not
involved, testers are directly connected to the database with proper access and testers can easily
verify data by running a few queries on the database. There can be issues identified like data loss,
deadlock, data corruption etc during this back-end testing and these issues are critical to fixing
before the system goes live into the production environment
#7) Browser Compatibility Testing
It is a subtype of Compatibility Testing (which is explained below) and is performed by the testing
team. Browser Compatibility Testing is performed for web applications and it ensures that the
software can run with the combination of different browser and operating system. This type of
testing also validates whether web application runs on all versions of all browsers or not.
#8) Backward Compatibility Testing
It is a type of testing which validates whether the newly developed software or updated software
works well with the older version of the environment or not. Backward Compatibility Testing
checks whether the new version of the software works properly with file format created by an older
version of the software; it also works well with data tables, data files, data structure created by the
older version of that software. If any of the software is updated then it should work well on top of
the previous version of that software.
#9) Black Box Testing
Internal system design is not considered in this type of testing. Tests are based on the requirements
and functionality. Detailed information about the advantages, disadvantages, and types of Black
box Testing can be seen here.
0300-2038128 Page | 36
Compiled by Dr. Ghulam Gilanie Janjua
#10) Boundary Value Testing
This type of testing checks the behavior of the application at the boundary level.
Boundary Value Testing is performed for checking if defects exist at boundary values. Boundary
Value Testing is used for testing a different range of numbers. There is an upper and lower
boundary for each range and testing is performed on these boundary values. If testing requires a
test range of numbers from 1 to 500 then Boundary Value Testing is performed on values at 0, 1,
2, 499, 500 and 501.
#11) Branch Testing
It is a type of White box Testing and is carried out during Unit Testing. Branch Testing, the name
itself suggests that the code is tested thoroughly by traversing at every branch.
#12) Comparison Testing
Comparison of a product’s strength and weaknesses with its previous versions or other similar
products is termed as Comparison Testing.
#13) Compatibility Testing
It is a testing type in which it validates how software behaves and runs in a different environment,
web servers, hardware, and network environment. Compatibility testing ensures that software can
run on a different configuration, different database, different browsers, and their versions.
Compatibility testing is performed by the testing team.
#14) Component Testing
It is mostly performed by developers after the completion of unit testing. Component
Testing involves testing of multiple functionalities as a single code and its objective is to identify
if any defect exists after connecting those multiple functionalities with each other.
#15) End-to-End Testing
Similar to system testing, End-to-End Testing involves testing of a complete application
environment in a situation that mimics real-world use, such as interacting with a database, using
network communications, or interacting with other hardware, applications, or systems if
appropriate.
#16) Equivalence Partitioning
It is a testing technique and a type of Black Box Testing. During this Equivalence Partitioning, a
set of the group is selected and a few values or numbers are picked up for testing. It is understood
that all values from that group generate the same output. The aim of this testing is to remove
redundant test cases within a specific group which generates the same output but not any defect.
Suppose, the application accepts values between -10 to +10 so using equivalence partitioning the
values picked up for testing are zero, one positive value, one negative value. So the Equivalence
Partitioning for this testing is -10 to -1, 0, and 1 to 10.
#17) Example Testing
It means real-time testing. Example Testing includes the real-time scenario, it also involves the
scenarios based on the experience of the testers.
#18) Exploratory Testing
Exploratory Testing is informal testing performed by the testing team. The objective of this testing
is to explore the application and looking for defects that exist in the application.
Sometimes it may happen that during this testing major defect discovered can even cause a system
failure. During Exploratory Testing, it is advisable to keep a track of what flow you have tested
and what activity you did before the start of the specific flow. An Exploratory Testing technique is
performed without documentation and test cases.
#20) Functional Testing
0300-2038128 Page | 37
Compiled by Dr. Ghulam Gilanie Janjua
This type of testing ignores the internal parts and focuses only on the output to check if it is as per
the requirement or not. It is a Black-box type testing geared to the functional requirements of an
application. For detailed information about Functional Testing click here.
#21) Graphical User Interface (GUI) Testing
The objective of this GUI Testing is to validate the GUI as per the business requirement. The
expected GUI of the application is mentioned in the Detailed Design Document and GUI mockup
screens. The GUI Testing includes the size of the buttons and input field present on the screen,
alignment of all text, tables, and content in the tables. It also validates the menu of the application,
after selecting different menu and menu items, it validates that the page does not fluctuate and the
alignment remains same after hovering the mouse on the menu or sub-menu.
#22) Gorilla Testing
Gorilla Testing is a testing type performed by a tester and sometimes by the developer the as well.
In Gorilla Testing, one module or the functionality in the module is tested thoroughly and heavily.
The objective of this testing is to check the robustness of the application.
#23) Happy Path Testing
The objective of Happy Path Testing is to test an application successfully on a positive flow. It
does not look for negative or error conditions. The focus is only on the valid and positive inputs
through which application generates the expected output.
#24) Incremental Integration Testing
Incremental Integration Testing is a Bottom-up approach for testing i.e continuous testing of an
application when new functionality is added. Application functionality and modules should be
independent enough to test separately. This is done by programmers or by testers.
#25) Install/Uninstall Testing
Installation and Uninstallation Testing is done on full, partial, or upgrade install/uninstall
processes on different operating systems under different hardware or software environment.
#26) Integration Testing
Testing of all integrated modules to verify the combined functionality after integration is termed
as Integration Testing. Modules are typically code modules, individual applications, client and
server applications on a network, etc. This type of testing is especially relevant to client/server and
distributed systems.
#27) Load Testing
It is a type of Non-Functional Testing and the objective of Load Testing is to check how much
load or maximum workload a system can handle without any performance degradation.
Load Testing helps to find the maximum capacity of the system under specific load and any issues
that cause software performance degradation. Load testing is performed using tools like JMeter,
LoadRunner, WebLoad, Silk performer, etc.
#28) Monkey Testing
Monkey Testing is carried out by a tester assuming that if the monkey uses the application then
how random input, values will be entered by the Monkey without any knowledge or understanding
of the application. The objective of Monkey Testing is to check if an application or system gets
crashed by providing random input values/data. Monkey Testing is performed randomly and no
test cases are scripted and it is not necessary to
Monkey Testing is performed randomly and no test cases are scripted and it is not necessary to be
aware of the full functionality of the system.
#29) Mutation Testing
Mutation Testing is a type of white box testing in which the source code of one of the program is
changed and verifies whether the existing test cases can identify these defects in the system.
0300-2038128 Page | 38
Compiled by Dr. Ghulam Gilanie Janjua
The change in the program source code is very minimal so that it does not impact the entire
application, only the specific area having the impact and the related test cases should able to
identify those errors in the system.
#30) Negative Testing
Testers having the mindset of “attitude to break” and using Negative Testing they validate that if
system or application breaks. A Negative Testing technique is performed using incorrect data,
invalid data or input. It validates that if the system throws an error of invalid input and behaves as
expected.
#31) Non-Functional Testing
It is a type of testing for which every organization having a separate team which usually called as
Non-Functional Test (NFT) team or Performance team. Non-Functional Testing involves testing
of non-functional requirements such as Load Testing, Stress Testing, Security, Volume, Recovery
Testing, etc. The objective of NFT testing is to ensure whether the response time of software or
application is quick enough as per the business requirement. It should not take much time to load
any page or system and should sustain during peak load.
#32) Performance Testing
This term is often used interchangeably with ‘stress’ and ‘load’ testing. Performance Testing is
done to check whether the system meets the performance requirements. Different performance and
load tools are used to do this testing.
#33) Recovery Testing
It is a type of testing which validates how well the application or system recovers from crashes or
disasters. Recovery Testing determines if the system is able to continue the operation after a
disaster. Assume that application is receiving data through the network cable and suddenly that
network cable has been unplugged.
Sometime later, plug the network cable; then the system should start receiving data from where it
lost the connection due to network cable unplugged.
#34) Regression Testing
Testing an application as a whole for the modification in any module or functionality is termed as
Regression Testing. It is difficult to cover all the system in Regression Testing, so
typically Automation Testing Tools are used for these types of testing.
#35) Risk-Based Testing (RBT)
In Risk-Based Testing, the functionalities or requirements are tested based on their priority. Risk-
Based Testing includes testing of highly critical functionality, which has the highest impact on
business and in which the probability of failure is very high. The priority decision is based on the
business need, so once priority is set for all functionalities then high priority functionality or test
cases are executed first followed by medium and then low priority functionalities. The low priority
functionality may be tested or not tested based on the available time. The Risk-Based Testing is
carried out if there is insufficient time available to test entire software and software needs to be
implemented on time without any delay. This approach is followed only by the discussion and
approval of the client and senior management of the organization.
#36) Sanity Testing
Sanity Testing is done to determine if a new software version is performing well enough to accept
it for a major testing effort or not. If an application is crashing for the initial use then the system is
not stable enough for further testing. Hence a build or an application is assigned to fix it.
#37) Security Testing
It is a type of testing performed by a special team of testers. A system can be penetrated by any
hacking way. Security Testing is done to check how the software or application or website is secure
0300-2038128 Page | 39
Compiled by Dr. Ghulam Gilanie Janjua
from internal and external threats. This testing includes how much software is secure from the
malicious program, viruses and how secure and strong the authorization and authentication
processes are. It also checks how software behaves for any hackers attack and malicious programs
and how software is maintained for data security after such a hacker attack.
#38) Smoke Testing
Whenever a new build is provided by the development team then the Software Testing team
validates the build and ensures that no major issue exists. The testing team ensures that the build
is stable and a detailed level of testing is carried out further. Smoke Testing checks that no show
stopper defect exists in the build which will prevent the testing team to test the application in detail.
If testers find that the major critical functionality is broken down at the initial stage itself then
testing team can reject the build and inform accordingly to the development team. Smoke Testing
is carried out to a detailed level of any Functional or Regression Testing.
#39) Static Testing
Static Testing is a type of testing which is executed without any code. The execution is performed
on the documentation during the testing phase. It involves reviews, walkthrough, and inspection
of the deliverables of the project. Static Testing does not execute the code instead of the code
syntax, naming conventions are checked. Static Testing is also applicable for test cases, test plan,
design document. It is necessary to perform static testing by the testing team as the defects
identified during this type of testing are cost-effective from the project perspective.
#40) Stress Testing
This testing is done when a system is stressed beyond its specifications in order to check how and
when it fails. This is performed under heavy load like putting large number beyond storage
capacity, complex database queries, continuous input to the system or database load.
#41) System Testing
Under System Testing technique, the entire system is tested as per the requirements. It is a Black-
box type Testing that is based on overall requirement specifications and covers all the combined
parts of a system.
#42) Unit Testing
Testing of an individual software component or module is termed as Unit Testing. It is typically
done by the programmer and not by testers, as it requires detailed knowledge of the internal
program design and code. It may also require developing test driver modules or test harnesses.
#43) Usability Testing
Under Usability Testing, User-friendliness check is done. The application flow is tested to know
if a new user can understand the application easily or not, Proper help documented if a user gets
stuck at any point. Basically, system navigation is checked in this testing.
#44) Vulnerability Testing
The testing which involves identifying weakness in the software, hardware and the network is
known as Vulnerability Testing. Malicious programs, the hacker can take control of the system, if
it is vulnerable to such kind of attacks, viruses, and worms.
So it is necessary to check if those systems undergo Vulnerability Testing before production. It
may identify critical defects, flaws in the security.
#45) Volume Testing
Volume Testing is a type of Non-Functional Testing performed by the Performance Testing team.
The software or application undergoes a huge amount of data and Volume Testing checks the
system behavior and response time of the application when the system came across such a high
volume of data. This high volume of data may impact the system’s performance and speed of the
processing time.
0300-2038128 Page | 40
Compiled by Dr. Ghulam Gilanie Janjua
#46) White Box Testing
White Box Testing is based on the knowledge about the internal logic of an application’s code.
It is also known as Glass box Testing. Internal software and code working should be known for
performing this type of testing. Under these tests are based on the coverage of code statements,
branches, paths, conditions, etc. The above-mentioned Software Testing Types are just a part of
testing. However, there is still a list of more than 100+ types of testing, but all testing types are not
used in all types of projects.
Incremental Model
In incremental model the whole requirements is divided into builds. Multiple development cycles
take place here, making the life cycle a ” multi-waterfall” cycle. Cycles are divided up into smaller,
more easily managed modules. Each module passes through the requirements, designs,
implementation and testing phase. A working version of software is produce during the first
module, so you have working software early on during the software life cycle. Each subsequent
release of the modules adds function to the previous release. The process continues till the
complete system is achieved.
In the diagram above when we working incrementally we are adding piece by piece but expect that
each piece is fully finished. Thus keep on adding the piece until it’s complete. As in the image
above a person has thought of the application. Then he started building it and in the first iteration
the first module of the application or product is totally ready and can be demoed to the customers.
Likewise in the second iteration the other module is ready and integrated to the first module.
Similarly, in the third iteration the whole product is ready and integrated. Hence the product got
ready step by step. Diagram of incremental model:
0300-2038128 Page | 41
Compiled by Dr. Ghulam Gilanie Janjua
Design & Testing Iimpleme
develop ntation
0300-2038128 Page | 42
Compiled by Dr. Ghulam Gilanie Janjua
Advantages of incremental model :
Generate working software quickly and early during the life cycle.
This model is more flexible-less costly to change scope and requirements.
It is easier to debug and test during smaller iteration.
Lower initial delivery cost.
Easier to manage risk because risky prices are identified and handled during it’d
iteration
Disadvantage of incremental model:
Needs good planning and design
Need a clear and complete definition of the whole system before it can be broken
down and built incrementally.
Total cost is higher than waterfall.
When to use the incremental model:
This model can be used when the requirement of the complete system are clearly
defined and understood.
Major requirements must be defined; however some details can evolve with
time.
There is a need to get a product to the market early.
A new technology is being used
Resources with needed skill set are not available
There are some high risk feature and goals.
Prototype model
Freezing the requirements before a design or coding can proceed a throwaway prototype is to
understand the requirements. This prototype is developed based on the currently known
requirements. By using this prototype, the client can get an “actual feel” of the system since the
interaction with prototype can enable the client to better understand the requirements of desired
system. Prototyping is an attractive idea for complicated and large system for which there is no
manual process and existing system to help determining the requirements. The prototype is usually
not complete system and many of the details are not built in the prototype. The goal is providing
a system with overall functionality.
Diagram of prototype model:
start
Requirements Quick design Building prototype
gathering
stop
Refining prototype
prototypingEngineer
model product Customer
evaluation
0300-2038128 Page | 43
Compiled by Dr. Ghulam Gilanie Janjua
Advantages of prototype model:
Users are actively involved in the development
In this methodology a working system is provided, the user get a better understanding of
the system being developed.
Error can be detect much earlier
Quicker user feedback is available leading to batter solution
Missing functionality can be identified easily
Confusing and difficult functions can be identified requirements, validations, quick
implementations of incomplete but functional application.
Disadvantages of prototype model:
Leads to implementing and then repairing way of building system
Practically, this methodology may increase the complexity of the system as scope of the
system may expand beyond original plans.
Incomplete application may cause application not to be used as the full system was
designed incomplete or inadequate problem analysis.
When to use prototype model:
Prototype model should be used when the desired system needs to have a lot of interaction
with the end users.
Typically online systems web interfaces have lot of interaction with the end users,
are best suited for prototype model. It might take a while for a system to be built that
allows ease of use and needs minimal training of the end user
Prototyping ensures that end users constantly work with the system and provide feedback
which incorporated in the prototype to result in a useable system. They are excellent for
designing good human interface system.
RAD MODEl
Rad model is rapid application development model. It is a type of incremental model. In RAD
model the component of functions are developed in parallel as if they were mini projects. The
developments are the time boxed, delivered and then assembled into a working prototype. This
can quickly give the customer something to see and use and to provide feedback regarding the
delivery and their requirements.
Diagram of RAD model:
Team #3
Team#1 Team #2
Business Business
modeling modeling
Business
0300-2038128
modeling
Page | 44
Data modeling
Compiled by Dr. Ghulam Gilanie Janjua
60-90 days
Spiral model
The spiral model is similar to the incremental model with more emphases places on risk analysis.
The spiral model has four phases: RISK ANALYSIS,ENGINEERING &
EVALLUATION,PLANNING . A software projects repeatedly passes thorough these phases in
0300-2038128 Page | 45
Compiled by Dr. Ghulam Gilanie Janjua
iteration (called spiral in this model). The base line spiral, starting in the planning phase,
requirements are gathered and risk is assessed. Each subsequent spiral build on base line spiral.
Planning phases: Requirements are gathered during planning phase, requirements like ‘BRS’ that
is ‘business requirements specification’ and ‘SRS’ that is ‘system requirements specifications’.
Risk analysis: In the risk analysis phase, a process is undertaken to identified risk and alternate
solutions. A prototype is produce at the end of the risk analysis phase. If any risk is found during
the risk analysis phase then alternate solution suggested and implemented.
Engineering phase: In this phase software is developed, along with the testing at the end of phase,
Hence in this phase developments and testing is done.
Evaluation phase: this phase allow the customer to evaluate the output of the project to data
before the project continues to next spiral.
Diagram of spiral model:
Planning risk analysis
P rototype
Coding
customer eveluation
testing
Evaluation Engineering
0300-2038128 Page | 46
Compiled by Dr. Ghulam Gilanie Janjua
Waterfall model
The waterfall model was first process model to be introduced. It is also referred to as linear-
sequential life cycle model. It is very simple to understand and use. In a waterfall model, each
phase must be completed fully before the next phase can be begin. This type of model is basically
used for the project which is small and there are no uncertain requirements. At the end of each
phase a review take place to determined if the project is on right path and whether or not to continue
or discard the project. In this model the testing start only after the development is complete. In
waterfall model phase don’t overlap.
Diagram of waterfall model:
Requirement
gathering & analysis
System design
Implementation
Deployment of system
0300-2038128 Page | 47
Compiled by Dr. Ghulam Gilanie Janjua
Technology is understood
There are no ambiguous requirements
Ample resources with require expertise are available freely
The projects is short
Very less customer enter action is involved during the development of the product. Once the
product is ready then only it can be demoed to the end users. Once the product is developed and if
any failure occurs then the cost of fixing such issues are very high, because we need to update
everywhere from document until the logic.
Developing a Design Model
To develop a complete specification of design (design model), four design models are
needed. These models are listed below.
Data design: This specifies the data structures for implementing the software by
converting data objects and their relationships identified during the analysis phase.
Various studies suggest that design engineering should begin with data design,
since this design lays the foundation for all other design models.
Interface design: This depicts how the software communicates with the system
that interoperates with it and with the end-users.
Data design is the first design activity, which results in less complex, modular and
efficient program structure. The information domain model developed during analysis
phase is transformed into data structures needed for implementing the software. The
data objects, attributes, and relationships depicted in entity relationship diagrams and
the information stored in data dictionary provide a base for data design activity. During
the data design process, data types are specified along with the integrity rules required
for the data. For specifying and designing efficient data structures, some principles
should be followed. These principles are listed below.
1. The data structures needed for implementing the software as well-as the operations that
can be applied on them should be identified.
2. A data dictionary should be developed to depict how different data objects interact with
each other and what constraints are to be imposed on the elements of data structure.
3. Stepwise refinement should be used in data design process and detailed design decisions
should be made later in the process.
4. Only those modules that need to access data stored in a data structure directly should be
aware of the representation of the data structure.
5. A library containing the set of useful data structures along with the operations that can be
performed on them should be maintained.
6. Language used for developing the system should support abstract data types.
0300-2038128 Page | 48
Compiled by Dr. Ghulam Gilanie Janjua
The structure of data can be viewed at three levels, namely, program component level,
application level, and business level. At the program component level, the design of
data structures and the algorithms required to manipulate them is necessary, if high-
quality software is desired. At the application level, it is crucial to convert the data
model into a database so that the specific business objectives of a system could be
achieved. At the business level, the collection of information stored in different
databases should be reorganized into data warehouse, which enables data mining that
has an influential impact on the business.
Software maintenance
Software maintenance is widely accepted part of SDLC now a days. It stands for all the
modifications and updations done after the delivery of software product. There are
number of reasons, why modifications are required, some of them are briefly mentioned
below:
Market Conditions - Policies, which changes over the time, such as taxation and
newly introduced constraints like, how to maintain bookkeeping, may trigger need
for modification.
Client Requirements - Over the time, customer may ask for new features or
functions in the software.
Host Modifications - If any of the hardware and/or platform (such as operating
system) of the target host changes, software changes are needed to keep
adaptability.
Organization Changes - If there is any business level change at client end, such
as reduction of organization strength, acquiring another company, organization
venturing into new business, need to modify in the original software may arise.
Types of maintenance
In a software lifetime, type of maintenance may vary based on its nature. It may be just
a routine maintenance tasks as some bug discovered by some user or it may be a large
event in itself based on maintenance size or nature. Following are some types of
maintenance based on their characteristics:
Corrective Maintenance - This includes modifications and updations done in
order to correct or fix problems, which are either discovered by user or concluded
by user error reports.
Adaptive Maintenance - This includes modifications and updations applied to
keep the software product up-to date and tuned to the ever-changing world of
technology and business environment.
Perfective Maintenance - This includes modifications and updates done in order
to keep the software usable over long period. It includes new features, new user
requirements for refining the software and improve its reliability and performance.
0300-2038128 Page | 49
Compiled by Dr. Ghulam Gilanie Janjua
Preventive Maintenance - This includes modifications and updations to prevent
future problems of the software. It aims to attend problems, which are not
significant at this moment but may cause serious issues in future.
Types of DFD
Logical DFD - This type of DFD concentrates on the system process, and flow of
data in the system.For example in a Banking software system, how data is
moved between different entities.
Physical DFD - This type of DFD shows how the data flow is actually
implemented in the system. It is more specific and close to the implementation.
DFD Components
DFD can represent Source, destination, storage and flow of data using the following set
of components -
0300-2038128 Page | 50
Compiled by Dr. Ghulam Gilanie Janjua
Entities - Entities are source and destination of information data. Entities are
represented by a rectangles with their respective names.
Process - Activities and action taken on the data are represented by Circle or
Round-edged rectangles.
Data Storage - There are two variants of data storage - it can either be
represented as a rectangle with absence of both smaller sides or as an open-
sided rectangle with only one side missing.
Data Flow - Movement of data is shown by pointed arrows. Data movement is
shown from the base of arrow as its source towards head of the arrow as
destination.
Levels of DFD
Level 0 - Highest abstraction level DFD is known as Level 0 DFD, which depicts
the entire information system as one diagram concealing all the underlying
details. Level 0 DFDs are also known as context level DFDs.
Level 1 - The Level 0 DFD is broken down into more specific, Level 1 DFD. Level
1 DFD depicts basic modules in the system and flow of data among various
modules. Level 1 DFD also mentions basic processes and sources of
information.
0300-2038128 Page | 51
Compiled by Dr. Ghulam Gilanie Janjua
Level 2 - At this level, DFD shows how data flows inside the modules mentioned
in Level 1.
Higher level DFDs can be transformed into more specific lower level DFDs with
deeper level of understanding unless the desired level of specification is achieved.
Structure Charts
Structure chart is a chart derived from Data Flow Diagram. It represents the system in
more detail than DFD. It breaks down the entire system into lowest functional modules,
describes functions and sub-functions of each module of the system to a greater detail
than DFD.
Structure chart represents hierarchical structure of modules. At each layer a specific task
is performed.
Here are the symbols used in construction of structure charts -
0300-2038128 Page | 52
Compiled by Dr. Ghulam Gilanie Janjua
Module - It represents process or subroutine or task. A control module branches
to more than one sub-module. Library Modules are re-usable and invokable from
any module.
Condition - It is represented by small diamond at the base of module. It depicts
that control module can select any of sub-routine based on some condition.
Jump - An arrow is shown pointing inside the module to depict that the control
0300-2038128 Page | 53
Compiled by Dr. Ghulam Gilanie Janjua
Loop - A curved arrow represents loop in the module. All sub-modules covered
by loop repeat execution of module.
Data flow - A directed arrow with empty circle at the end represents data flow.
Control flow - A directed arrow with filled circle at the end represents control
flow.
HIPO Diagram
HIPO (Hierarchical Input Process Output) diagram is a combination of two organized
method to analyze the system and provide the means of documentation. HIPO model
was developed by IBM in year 1970.
HIPO diagram represents the hierarchy of modules in the software system. Analyst uses
HIPO diagram in order to obtain high-level view of system functions. It decomposes
functions into sub-functions in a hierarchical manner. It depicts the functions performed
by system.
0300-2038128 Page | 54
Compiled by Dr. Ghulam Gilanie Janjua
HIPO diagrams are good for documentation purpose. Their graphical representation
makes it easier for designers and managers to get the pictorial idea of the system
structure.
In contrast to IPO (Input Process Output) diagram, which depicts the flow of control and
data in a module, HIPO does not provide any information about data flow or control flow.
Example
Both parts of HIPO diagram, Hierarchical presentation and IPO Chart are used for
structure design of software program as well as documentation of the same.
Structured English
Most programmers are unaware of the large picture of software so they only rely on what
their managers tell them to do. It is the responsibility of higher software management to
provide accurate information to the programmers to develop accurate yet fast code.
Other forms of methods, which use graphs or diagrams, may are sometimes interpreted
differently by different people.
0300-2038128 Page | 55
Compiled by Dr. Ghulam Gilanie Janjua
Hence, analysts and designers of the software come up with tools such as Structured
English. It is nothing but the description of what is required to code and how to code it.
Structured English helps the programmer to write error-free code.
Other form of methods, which use graphs or diagrams, may are sometimes interpreted
differently by different people. Here, both Structured English and Pseudo-Code tries to
mitigate that understanding gap.
Structured English is the It uses plain English words in structured programming
paradigm. It is not the ultimate code but a kind of description what is required to code
and how to code it. The following are some tokens of structured programming.
IF-THEN-ELSE,
DO-WHILE-UNTIL
Analyst uses the same variable and data name, which are stored in Data Dictionary,
making it much simpler to write and understand the code.
Example
The code written in Structured English is more like day-to-day spoken English. It can not
be implemented directly as a code of software. Structured English is independent of
programming language.
Pseudo-Code
Pseudo code is written more close to programming language. It may be considered as
augmented programming language, full of comments and descriptions.
Pseudo code avoids variable declaration but they are written using some actual
programming language’s constructs, like C, Fortran, Pascal etc.
Pseudo code contains more programming details than Structured English. It provides a
method to perform the task, as if a computer is executing the code.
Example
0300-2038128 Page | 56
Compiled by Dr. Ghulam Gilanie Janjua
Program to print Fibonacci up to n numbers.
void function Fibonacci
Get value of n;
Set value of a to 1;
Set value of b to 1;
Initialize I to 0
for (i=0; i< n; i++)
{
if a greater than b
{
Increase b by a;
Print b;
}
else if b greater than a
{
increase a by b;
print a;
}
}
Decision Tables
A Decision table represents conditions and the respective actions to be taken to address
them, in a structured tabular format.
It is a powerful tool to debug and prevent errors. It helps group similar information into a
single table and then by combining tables it delivers easy and convenient decision-
making.
To create the decision table, the developer must follow basic four steps:
Example
Let us take a simple example of day-to-day problem with our Internet connectivity. We
begin by identifying all problems that can arise while starting the internet and their
respective possible solutions.
0300-2038128 Page | 57
Compiled by Dr. Ghulam Gilanie Janjua
We list all possible problems under column conditions and the prospective actions under
column Actions.
Conditions/Actions Rules
Shows Connected N N N N Y Y Y Y
Opens Website Y N Y N Y N Y N
Do no action
Table : Decision Table – In-house Internet Troubleshooting
Entity-Relationship Model
Entity-Relationship model is a type of database model based on the notion of real world
entities and relationship among them. We can map real world scenario onto ER database
model. ER Model creates a set of entities with their attributes, a set of constraints and
relation among them.
ER Model is best used for the conceptual design of database. ER Model can be
represented as follows :
Entity - An entity in ER Model is a real world being, which has some properties
called attributes. Every attribute is defined by its corresponding set of values,
called domain.
0300-2038128 Page | 58
Compiled by Dr. Ghulam Gilanie Janjua
For example, Consider a school database. Here, a student is an entity. Student
has various attributes like name, id, age and class etc.
Relationship - The logical association among entities is called relationship.
Relationships are mapped with entities in various ways. Mapping cardinalities
define the number of associations between two entities.
Mapping cardinalities:
o one to one
o one to many
o many to one
o many to many
Data Dictionary
Data dictionary is the centralized collection of information about data. It stores meaning
and origin of data, its relationship with other data, data format for usage etc. Data
dictionary has rigorous definitions of all names in order to facilitate user and software
designers.
Data dictionary is often referenced as meta-data (data about data) repository. It is
created along with DFD (Data Flow Diagram) model of software program and is expected
to be updated whenever DFD is changed or updated.
The data is referenced via data dictionary while designing and implementing software.
Data dictionary removes any chances of ambiguity. It helps keeping work of
programmers and designers synchronized while using same object reference
everywhere in the program.
Data dictionary provides a way of documentation for the complete database system in
one place. Validation of DFD is carried out using data dictionary.
Contents
Data Flow
Data Structure
Data Elements
Data Stores
Data Processing
Data Flow is described by means of DFDs as studied earlier and represented in algebraic
form as described.
0300-2038128 Page | 59
Compiled by Dr. Ghulam Gilanie Janjua
= Composed of
{} Repetition
() Optional
+ And
[/] Or
Example
Data Elements
Data elements consist of Name and descriptions of Data and Control Items, Internal or
External data stores etc. with the following details:
Primary Name
Secondary Name (Alias)
Use-case (How and where to use)
Content Description (Notation etc. )
Supplementary Information (preset values, constraints etc.)
Data Store
It stores the information from where the data enters into the system and exists out of the
system. The Data Store may include -
Files
o Internal to software.
o External to software but on the same machine.
o External to software and system, located on different machine.
Tables
o Naming convention
o Indexing property
Data Processing
0300-2038128 Page | 60
Compiled by Dr. Ghulam Gilanie Janjua
Logical: As user sees it
Physical: As software sees it
Structured Design
Structured design is a conceptualization of problem into several well-organized elements
of solution. It is basically concerned with the solution design. Benefit of structured design
is, it gives better understanding of how the problem is being solved. Structured design
also makes it simpler for designer to concentrate on the problem more accurately.
Structured design is mostly based on ‘divide and conquer’ strategy where a problem is
broken into several small problems and each small problem is individually solved until
the whole problem is solved.
The small pieces of problem are solved by means of solution modules. Structured design
emphasis that these modules be well organized in order to achieve precise solution.
These modules are arranged in hierarchy. They communicate with each other. A good
structured design always follows some rules for communication among multiple
modules, namely -
Cohesion - grouping of all functionally related elements.
Coupling - communication between different modules.
A good structured design has high cohesion and low coupling arrangements.
0300-2038128 Page | 61
Compiled by Dr. Ghulam Gilanie Janjua
Another characteristic of functions is that when a program calls a function, the function
changes the state of the program, which sometimes is not acceptable by other modules.
Function oriented design works well where the system state does not matter and
program/functions work on input rather than on a state.
Design Process
The whole system is seen as how data flows in the system by means of data flow
diagram.
DFD depicts how functions changes data and state of entire system.
The entire system is logically broken down into smaller units known as functions
on the basis of their operation in the system.
Each function is then described at large.
Objects - All entities involved in the solution design are known as objects. For
example, person, banks, company and customers are treated as objects. Every
entity has some attributes associated to it and has some methods to perform on
the attributes.
Classes - A class is a generalized description of an object. An object is an
instance of a class. Class defines all the attributes, which an object can have and
methods, which defines the functionality of the object.
In the solution design, attributes are stored as variables and functionalities are
defined by means of methods or procedures.
0300-2038128 Page | 62
Compiled by Dr. Ghulam Gilanie Janjua
different types. Depending upon how the function is invoked, respective portion
of the code gets executed.
Design Process
We know that a system is composed of more than one sub-systems and it contains a
number of components. Further, these sub-systems and components may have their on
set of sub-system and components and creates hierarchical structure in the system.
Top-down design takes the whole software system as one entity and then decomposes
it to achieve more than one sub-system or component based on some characteristics.
Each sub-system or component is then treated as a system and decomposed further.
This process keeps on running until the lowest level of system in the top-down hierarchy
is achieved.
Top-down design starts with a generalized model of system and keeps on defining the
more specific part of it. When all components are composed the whole system comes
into existence.
Top-down design is more suitable when the software solution needs to be designed from
scratch and specific details are unknown.
Bottom-up Design
The bottom up design model starts with most specific and basic components. It proceeds
with composing higher level of components by using basic or lower level components. It
keeps creating higher level components until the desired system is not evolved as one
single component. With each higher level, the amount of abstraction is increased.
0300-2038128 Page | 63
Compiled by Dr. Ghulam Gilanie Janjua
Bottom-up strategy is more suitable when a system needs to be created from some
existing system, where the basic primitives can be used in the newer system.
Both, top-down and bottom-up approaches are not practical individually. Instead, a good
combination of both is used.
Attractive
Simple to use
Responsive in short time
Clear to understand
Consistent on all interfacing screens
UI is broadly divided into two categories:
0300-2038128 Page | 64
Compiled by Dr. Ghulam Gilanie Janjua
CLI uses less amount of computer resource as compared to GUI.
CLI Elements
0300-2038128 Page | 65
Compiled by Dr. Ghulam Gilanie Janjua
GUI Elements
0300-2038128 Page | 66
Compiled by Dr. Ghulam Gilanie Janjua
hardware in almost real-time. Cursors are also named pointers in GUI systems.
They are used to select menus, windows and other application features.
Text-Box - Provides an area for user to type and enter text-based data.
Buttons - They imitate real life buttons and are used to submit inputs to the
software.
Radio-button - Displays available options for selection. Only one can be selected
among all offered.
0300-2038128 Page | 67
Compiled by Dr. Ghulam Gilanie Janjua
Check-box - Functions similar to list-box. When an option is selected, the box is
marked as checked. Multiple options represented by check boxes can be
selected.
List-box - Provides list of available items for selection. More than one item can
be selected.
Sliders
Combo-box
Data-grid
Drop-down list
0300-2038128 Page | 68
Compiled by Dr. Ghulam Gilanie Janjua
GUI Requirement Gathering - The designers may like to have list of all functional
and non-functional requirements of GUI. This can be taken from user and their
existing software solution.
User Analysis - The designer studies who is going to use the software GUI. The
target audience matters as the design details change according to the knowledge
and competency level of the user. If user is technical savvy, advanced and
complex GUI can be incorporated. For a novice user, more information is included
on how-to of software.
Task Analysis - Designers have to analyze what task is to be done by the
software solution. Here in GUI, it does not matter how it will be done. Tasks can
be represented in hierarchical manner taking one major task and dividing it further
into smaller sub-tasks. Tasks provide goals for GUI presentation. Flow of
information among sub-tasks determines the flow of GUI contents in the software.
GUI Design & implementation - Designers after having information about
requirements, tasks and user environment, design the GUI and implements into
code and embed the GUI with working or dummy software in the background. It
is then self-tested by the developers.
Testing - GUI testing can be done in various ways. Organization can have in-
house inspection, direct involvement of users and release of beta version are few
of them. Testing may include usability, compatibility, user acceptance etc.
0300-2038128 Page | 69
Compiled by Dr. Ghulam Gilanie Janjua
There are several tools available using which the designers can create entire GUI on a
mouse click. Some tools can be embedded into the software environment (IDE).
GUI implementation tools provide powerful array of GUI controls. For software
customization, designers can change the code accordingly.
There are different segments of GUI tools according to their different use and platform.
Example
Mobile GUI, Computer GUI, Touch-Screen GUI etc. Here is a list of few tools which come
handy to build GUI:
FLUID
AppInventor (Android)
LucidChart
Wavemaker
Visual Studio
0300-2038128 Page | 70
Compiled by Dr. Ghulam Gilanie Janjua
Permit easy reversal of actions - This feature relieves anxiety, since the user
knows that errors can be undone. Easy reversal of actions encourages
exploration of unfamiliar options. The units of reversibility may be a single action,
a data entry, or a complete group of actions.
Support internal locus of control - Experienced operators strongly desire the
sense that they are in charge of the system and that the system responds to their
actions. Design the system to make users the initiators of actions rather than the
responders.
Reduce short-term memory load - The limitation of human information
processing in short-term memory requires the displays to be kept simple, multiple
page displays be consolidated, window-motion frequency be reduced, and
sufficient training time be allotted for codes, mnemonics, and sequences of
actions.
Software Implementation
Here, we will study about programming methods, documentation and challenges in
software implementation.
Structured Programming
In the process of coding, the lines of code keep multiplying, thus, size of the software
increases. Gradually, it becomes next to impossible to remember the flow of program. If
one forgets how software and its underlying programs, files, procedures are constructed
it then becomes very difficult to share, debug and modify the program. The solution to
this is structured programming. It encourages the developer to use subroutines and
loops instead of using simple jumps in the code, thereby bringing clarity in the code and
improving its efficiency Structured programming also helps programmer to reduce
coding time and organize code properly.
Structured programming states how the program shall be coded. Structured
programming uses three main concepts:
Top-down analysis - A software is always made to perform some rational work.
This rational work is known as problem in the software parlance. Thus it is very
important that we understand how to solve the problem. Under top-down analysis,
the problem is broken down into small pieces where each one has some
significance. Each problem is individually solved and steps are clearly stated
about how to solve the problem.
Modular Programming - While programming, the code is broken down into
smaller group of instructions. These groups are known as modules, subprograms
or subroutines. Modular programming based on the understanding of top-down
analysis. It discourages jumps using ‘goto’ statements in the program, which often
makes the program flow non-traceable. Jumps are prohibited and modular format
is encouraged in structured programming.
0300-2038128 Page | 71
Compiled by Dr. Ghulam Gilanie Janjua
Structured Coding - In reference with top-down analysis, structured coding sub-
divides the modules into further smaller units of code in the order of their
execution. Structured programming uses control structure, which controls the flow
of the program, whereas structured coding uses control structure to organize its
instructions in definable patterns.
Functional Programming
Functional programming is style of programming language, which uses the concepts of
mathematical functions. A function in mathematics should always produce the same
result on receiving the same argument. In procedural languages, the flow of the program
runs through procedures, i.e. the control of program is transferred to the called
procedure. While control flow is transferring from one procedure to another, the program
changes its state.
In procedural programming, it is possible for a procedure to produce different results
when it is called with the same argument, as the program itself can be in different state
while calling it. This is a property as well as a drawback of procedural programming, in
which the sequence or timing of the procedure execution becomes important.
Functional programming provides means of computation as mathematical functions,
which produces results irrespective of program state. This makes it possible to predict
the behavior of the program.
Functional programming uses the following concepts:
First class and High-order functions - These functions have capability to accept
another function as argument or they return other functions as results.
Pure functions - These functions do not include destructive updates, that is, they
do not affect any I/O or memory and if they are not in use, they can easily be
removed without hampering the rest of the program.
Recursion - Recursion is a programming technique where a function calls itself
and repeats the program code in it unless some pre-defined condition matches.
Recursion is the way of creating loops in functional programming.
Strict evaluation - It is a method of evaluating the expression passed to a function
as an argument. Functional programming has two types of evaluation methods,
strict (eager) or non-strict (lazy). Strict evaluation always evaluates the expression
before invoking the function. Non-strict evaluation does not evaluate the
expression unless it is needed.
λ-calculus - Most functional programming languages use λ-calculus as their type
systems. λ-expressions are executed by evaluating them as they occur.
Common Lisp, Scala, Haskell, Erlang and F# are some examples of functional
programming languages.
Programming style
0300-2038128 Page | 72
Compiled by Dr. Ghulam Gilanie Janjua
Programming style is set of coding rules followed by all the programmers to write the
code. When multiple programmers work on the same software project, they frequently
need to work with the program code written by some other developer. This becomes
tedious or at times impossible, if all developers do not follow some standard
programming style to code the program.
An appropriate programming style includes using function and variable names relevant
to the intended task, using well-placed indentation, commenting code for the
convenience of reader and overall presentation of code. This makes the program code
readable and understandable by all, which in turn makes debugging and error solving
easier. Also, proper coding style helps ease the documentation and updation.
Coding Guidelines
Practice of coding style varies with organizations, operating systems and language of
coding itself.
The following coding elements may be defined under coding guidelines of an
organization:
Naming conventions - This section defines how to name functions, variables,
constants and global variables.
Indenting - This is the space left at the beginning of line, usually 2-8 whitespace
or single tab.
Whitespace - It is generally omitted at the end of line.
Operators - Defines the rules of writing mathematical, assignment and logical
operators. For example, assignment operator ‘=’ should have space before and
after it, as in “x = 2”.
Control Structures - The rules of writing if-then-else, case-switch, while-until and
for control flow statements solely and in nested fashion.
Line length and wrapping - Defines how many characters should be there in one
line, mostly a line is 80 characters long. Wrapping defines how a line should be
wrapped, if is too long.
Functions - This defines how functions should be declared and invoked, with and
without parameters.
Variables - This mentions how variables of different data types are declared and
defined.
Comments - This is one of the important coding components, as the comments
included in the code describe what the code actually does and all other associated
descriptions. This section also helps creating help documentations for other
developers.
Software Documentation
0300-2038128 Page | 73
Compiled by Dr. Ghulam Gilanie Janjua
Software documentation is an important part of software process. A well written
document provides a great tool and means of information repository necessary to know
about software process. Software documentation also provides information about how
to use the product.
A well-maintained documentation should involve the following documents:
Requirement documentation - This documentation works as key tool for
software designer, developer and the test team to carry out their respective tasks.
This document contains all the functional, non-functional and behavioral
description of the intended software.
Source of this document can be previously stored data about the software,
already running software at the client’s end, client’s interview, questionnaires and
research. Generally it is stored in the form of spreadsheet or word processing
document with the high-end software management team.
This documentation works as foundation for the software to be developed and is
majorly used in verification and validation phases. Most test-cases are built
directly from requirement documentation.
Software Design documentation - These documentations contain all the
necessary information, which are needed to build the software. It
contains: (a) High-level software architecture, (b) Software design
details, (c) Data flow diagrams, (d) Database design
These documents work as repository for developers to implement the software.
Though these documents do not give any details on how to code the program,
they give all necessary information that is required for coding and implementation.
Technical documentation - These documentations are maintained by the
developers and actual coders. These documents, as a whole, represent
information about the code. While writing the code, the programmers also mention
objective of the code, who wrote it, where will it be required, what it does and how
it does, what other resources the code uses, etc.
The technical documentation increases the understanding between various
programmers working on the same code. It enhances re-use capability of the
code. It makes debugging easy and traceable.
There are various automated tools available and some comes with the
programming language itself. For example java comes JavaDoc tool to generate
technical documentation of code.
User documentation - This documentation is different from all the above
explained. All previous documentations are maintained to provide information
about the software and its development process. But user documentation
explains how the software product should work and how it should be used to get
the desired results.
0300-2038128 Page | 74
Compiled by Dr. Ghulam Gilanie Janjua
These documentations may include, software installation procedures, how-to
guides, user-guides, uninstallation method and special references to get more
information like license updation etc.
0300-2038128 Page | 75
Compiled by Dr. Ghulam Gilanie Janjua
Parameter Meaning
When we select source file to view its complexity details in Metric Viewer, the following
result is seen in Metric Report:
n Vocabulary n1 + n2
N Size N1 + N2
0300-2038128 Page | 76
Compiled by Dr. Ghulam Gilanie Janjua
Connect nodes as follows:
o If control can branch from block i to block j
Draw an arc
o From exit node to entry node
Draw an arc.
To calculate Cyclomatic complexity of a program module, we use the formula -
V(G) = e – n + 2
Where
e is total number of edges
n is total number of nodes
Function Point
It is widely used to measure the size of software. Function Point concentrates on
functionality provided by the system. Features and functionality of the system are used
to measure the software complexity.
Function point counts on five parameters, named as External Input, External Output,
Logical Internal Files, External Interface Files, and External Inquiry. To consider the
complexity of software each parameter is further categorized as simple, average or
complex.
0300-2038128 Page | 77
Compiled by Dr. Ghulam Gilanie Janjua
External Input
Every unique input to the system, from outside, is considered as external input.
Uniqueness of input is measured, as no two inputs should have same formats. These
inputs can either be data or control parameters.
Simple - if input count is low and affects less internal files
Complex - if input count is high and affects more internal files
Average - in-between simple and complex.
External Output
All output types provided by the system are counted in this category. Output is
considered unique if their output format and/or processing are unique.
Simple - if output count is low
Complex - if output count is high
Average - in between simple and complex.
Every software system maintains internal files in order to maintain its functional
information and to function properly. These files hold logical data of the system. This
logical data may contain both functional data and control data.
0300-2038128 Page | 78
Compiled by Dr. Ghulam Gilanie Janjua
Simple - if number of record types are low
Complex - if number of record types are high
Average - in between simple and complex.
Software system may need to share its files with some external software or it may need
to pass the file for processing or as parameter to some function. All these files are
counted as external interface files.
Simple - if number of record types in shared file are low
Complex - if number of record types in shared file are high
Average - in between simple and complex.
External Inquiry
An inquiry is a combination of input and output, where user sends some data to inquire
about as input and the system responds to the user with the output of inquiry processed.
The complexity of a query is more than External Input and External Output. Query is said
to be unique if its input and output are unique in terms of format and data.
Simple - if query needs low processing and yields small amount of output data
Complex - if query needs high process and yields large amount of output data
Average - in between simple and complex.
Each of these parameters in the system is given weightage according to their class and
complexity. The table below mentions the weightage given to each parameter:
Inputs 3 4 6
Outputs 4 5 7
Enquiry 3 4 6
Files 7 10 15
Interfaces 5 7 10
The table above yields raw Function Points. These function points are adjusted
according to the environment complexity. System is described using fourteen different
characteristics:
Data communications
0300-2038128 Page | 79
Compiled by Dr. Ghulam Gilanie Janjua
Distributed processing
Performance objectives
Operation configuration load
Transaction rate
Online data entry,
End user efficiency
Online update
Complex processing logic
Re-usability
Installation ease
Operational ease
Multiple sites
Desire to facilitate changes
These characteristics factors are then rated from 0 to 5, as mentioned below:
No influence
Incidental
Moderate
Average
Significant
Essential
All ratings are then summed up as N. The value of N ranges from 0 to 70 (14 types of
characteristics x 5 types of ratings). It is used to calculate Complexity Adjustment Factors
(CAF), using the following formulae:
CAF = 0.65 + 0.01N
Then,
Delivered Function Points (FP)= CAF x Raw FP
This FP can then be used in various metrics, such as:
Cost = $ / FP
Quality = Errors / FP
Productivity = FP / person-month
0300-2038128 Page | 80
View publication stats