chapter 7 desain rekayasa perangkat lunak analysis...

29
Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modeling Software Engineering: A Practitioner’s Approach by Roger S. Pressman

Upload: duongdat

Post on 11-Apr-2019

229 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Chapter 7Desain Rekayasa Perangkat

Lunak Analysis Modeling

Software Engineering: A Practitioner’s Approach

by Roger S. Pressman

Page 2: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Material

• Scenario-Based Modeling

• Flow Oriented Modeling

• Class-Bases Modeling

• Class-Responsibility Modeling

Page 3: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Analysis Model

Elements of the analysis model

Page 4: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Scenario-Based Modeling

Page 5: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Use-case Diagram

Use-case diagram for surveillance function

Page 6: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Alternative Actions

•Can the actor take some other action at this point?

• Is it possible that the actor will encounter some error condition at this point?

• Is it possible that the actor will encounter behavior invoked by some event outside the actor’s control?

Page 7: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Activity diagram for

Access camera

surveillance—display

camera views function

Page 8: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Swimlane

diagram

Page 9: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Flow-Oriented Modeling

Page 10: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Guidelines

• Depict the system as single bubble in level 0.

• Carefully note primary input and output.

• Refine by isolating candidate processes and their associated data objects and data stores.

• Label all elements with meaningful names.

• Maintain information conformity between levels.

• Refine one bubble at a time.

Page 11: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Data Flow Diagram

Context-level DFD for SafeHome security function

Page 12: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Grammatical Parse

• The SafeHome security function enables the homeowner to configure the security system when it is installed, monitors all sensors connected to the security system, and interacts with the homeowner through the Internet, a PC, or a control panel.

• During installation, the SafeHome PC is used to program and configure the system. Each sensor is assigned a number and type, a master password is programmed for arming and disarming the system, and telephone number(s) are input for dialing when a sensor eventoccurs.

• When a sensor event is recognized, the software invokes an audible alarm attached to the system. After a delay time that is specified by the homeowner during system configuration activities, the software dials a telephone number of a monitoring service, provides information about the location, reporting the nature of the event that has been detected. The telephone number will be redialed every 20 seconds until a telephone connection is obtained.

• The homeowner receives security information via a control panel, the PC, or a browser, collectively called an interface. The interface displays prompting messages and systemstatus information on the control panel, the PC, or the browser window. Homeowner interaction takes the following form…

Page 13: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis
Page 14: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Level 2 DFD that refines the monitor sensors process

Page 15: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Control Flow Diagram

State diagram for SafeHome security function

Page 16: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Class-Based Modeling

Page 17: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Identifying Analysis Classes

•External entities that produce or consume information

•Things that are part of the information domain

•Occurrences or events

•Roles played by people who interact with the system

•Organizational units

•Places that establish context

•Structures that define a class of objects

Page 18: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Class Selection Criteria

1. Retained information

2. Needed services

3. Multiple attributes

4. Common attributes

5. Common operations

6. Essential requirements

Page 19: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Identifying Classes

Potential class Classification Accept / Reject

homeowner role; external entity reject: 1, 2 fail

sensor external entity accept

control panel external entity accept

installation occurrence reject

(security) system thing accept

number, type not objects, attributes reject: 3 fails

master password thing reject: 3 fails

telephone number thing reject: 3 fails

sensor event occurrence accept

audible alarm external entity accept: 1 fails

monitoring service organizational unit; ee reject: 1, 2 fail

Page 20: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Class Diagram

Class diagram for the system class

Page 21: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Class Diagram

Class diagram for FloorPlan

Page 22: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

CRC Modeling

A CRC model index card for FloorPlan class

Page 23: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Class Responsibilities

• Distribute system intelligence across classes.

• State each responsibility as generally as possible.

• Put information and the behavior related to it in the same class.

• Localize information about one thing rather than distributing it across multiple classes.

• Share responsibilities among related classes, when appropriate.

Page 24: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Class Collaborations

•Relationships between classes:• is-part-of — used when classes are part of an aggregate

class.• has-knowledge-of — used when one class must acquire

information from another class.• depends-on — used in all other cases.

Page 25: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Class Diagrams

Top: Multiplicity

Bottom: Dependencies

Page 26: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Behavioral Modeling

Page 27: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Identifying Events

• A use-case is examined for points of information exchange.

• The homeowner uses the keypad to key in a four-digit password. The password is compared with the valid password stored in the system. If the password in incorrect, the control panel will beep once and reset itself for additional input. If the password is correct, the control panel awaits further action.

Page 28: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

State Diagram

State diagram for the ControlPanel class

Page 29: Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modelingdinus.ac.id/repository/.../ajar/Rpl_7_Desain_RPL_Analysis_Modeling.pdf · Chapter 7 Desain Rekayasa Perangkat Lunak Analysis

Sequence Diagram

Sequence diagram (partial) for the SafeHome security function