Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 3, Issue 1, January February 2014 ISSN 2278-6856
Introduction I
Software systems analysts have to identify the software systems are to be developed, the purpose is to perform certain tasks as determined by the software users. Hence software systems have to provide functionalities that allow them to perform the tasks for which they have been designed. Furthermore software systems are destined to be embedded into organizational settings, consisting of human beings, machines and possibly other software systems. The organizations impose constraints on the operational and performance characteristics of the software. Human beings benefit from the applications of software systems in data processing, information management, machine control systems, communication networks etc. The usability of software systems depends on the perception of their users as to what the software should do, can do and how well they fit into the users' environment. Requirements engineering can be regarded as consisting of a set of interrelating activities that result in the production of a SRSD. Requirement engineering consists of requirement elicitation activities, requirement analysis activities and requirement specification activities. The decomposition of the software requirement engineering process has to be taken as a convenient description of necessary tasks that are carried out and not necessarily performed in any order or at distinct periods in time. However a particular item in the software requirement development will have been elicited, analyzed and specified. In fact, a single activity may be seen as requirement elicitation and requirement analysis at the same time. Requirements are often synthesized during an iterative elicitation and analysis cycle. There is no Volume 3, Issue 1 January February 2014
necessary clear distinction between the elicitation and analysis phases. For example a discussion between the analyst and the customer can reveal particular characteristics of the requirements analysis and stimulate the customer to enunciate new or modified requirements elicitation. It is appropriate to explain what is considered as being an item of requirement as used throughout this document an item of requirement refers to a capability provided by the software system and which can produce a particular result an input, an output, or a data transformation that is observable by the user. The characteristic that a requirement relates to an observable result is necessary, as it provides a means of verifying that the software behaves as expected by the users. Each capability can be considered on its own, and can be implemented independently from other capabilities provided by the system. However the design of the software should not affect the actual result produced by the capability, but should only be considered as a matter of convenience and efficiency, given the particular software development platform chosen. In fact, it is generally accepted that design consideration should not be considered during the requirement engineering process, set of all such requirement items form the requirement specification for the software system.
Figure 1 shows the Business Requirements Quality Attributes Figure represents the relationship between goals and architecture, business goal is to capture market share by providing best of breed quality in domain and other hand make use of development staffs current knowledge training might lead the architecture to choose a familiar technology over an unfamiliar one. To build PALM we clustered categories of standard business goals for example growth and continuity of the organization managing market position and meeting responsibility towards society. PALM takes place in a workshop format where representatives for the business development support and technical development aspects of the product being participate. Advantages of PALM includes Clarified quality attribute requirement Improved architecture documentation Documented basis for architectural decisions Identified risks early lifecycle
Eliciting security requirements with security in mind and used for traditional requirements engineering, developing a list of selection process we have different elicitation method. Use-case describes the system owner need the system to show specification of requirements is collection of use cases should not be used as a substitute for a requirements specification document. Misuse cases apply the concept of negative scenario situation that the system owner does not want to occur in a use case context for example business leaders military planners are familiar with analyzing their opponents best moves as identifiable threats. Misuse case Volume 3, Issue 1 January February 2014
Once after the discussion requirement elicitation team to understand the each requirement methods and effective use them in the real case to focus on the different methods. Conversational techniques are really help for collection hectic information about the requirements along with conversational methods uncover opinions and goals of different individuals. Observational methods are best choice for uncovering basic aspects of routine order to provide vital information for designing solution, these methods are used to directly extracted requirements from peoples behavior and verbalized thoughts. Analytical methods have numerous advantages as people are not the only source of information in terms of requirements, reuse of already available information saves the time and cost.
Figure 2 Requirements Process in Software Lifecycle Requirements elicitation is a process of identifying needs and disparities among the involved communities for the purpose of defining and distilling requirements to meet the constraints. Requirements elicitation are acquisition requirements capture, discovery requirements gathering problem analysis and understanding etc. sources that can be used for eliciting requirements some of them are customer requirements specification, documentation pertaining to pre-existing system that perform functions similar to the anticipated novel software system, users of pre-existing systems, potential users of the new system. Challenges during the elicitation phase ensure effective communication between various stakeholders and tacit knowledge, requirement elicitation phase is a collection of elicitation notes or informal document which describes Volume 3, Issue 1 January February 2014
Developing Environment
Table 1 : Software Requirements Specifications for proposed system
Deployment Diagram:
Reference [1] Borgida A. and Greenspan S..J. (1980), "Data and Activities: Exploiting Hierarchies of Classes", in Proc of Workshop on data Abstraction, Databases and Conceptual Modelling, M. Brodie and S. Zilles (eds), Joint SIGART,SIGMOD, SIGPLAN Newsletter. [2] Conklin J. and Begeman M. (1988), "gIBIS, a Hypertext tool for exploratory policy discussion", in ACM Transaction on Office Information Systems, vol 6, pp303-331. Davis A.M. (1990), "Software Requirements, Analysis and Specifications", Englewood Cliffs, N.J., Prentice Hall. [3] Business goals to architecturally significant requirements for software systems Paul C May 2010 [4] Frank Carr with Kim Hurtado, Charles Lancaster, Charles Markert, and Paul Tucker, Partnering in Construction: A Practical Guide to Project Success James Herbsleb, Anita Carlton, James.
Thirupathi Marupaka pursuing M.Tech Computer Science Engineering from IETE B.E from Osmania University He is having 5 years of experience in teaching currently working as Asst Prof for Osmania University Hyderabad has guided many UG & PG students. His research areas include Distributed Systems, Network Security, and Design Patterns. Ch. Raju M.Tech Computer Science and Engineering from JNTUH MS.Is from Osmania University BCA from Osmania University. He is having 8+ years of experience in teaching currently working as Asst Prof for Osmania University Hyderabad has guided many UG & PG students. His research areas include Distributed Systems, Network Security, and Design Patterns.
Page 37