SElec-5 DomainModel (1)

SElec-5 DomainModel (1) - LECTURE 5: Domain Modeling Ivan...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Ivan Marsic Rutgers University LECTURE 5: Domain Modeling
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Topics Identifying Concepts Concept Associations Concept Attributes Contracts: Preconditions and Postconditions
Background image of page 2
Use Cases vs. Domain Model (b) (a) In use case analysis , we consider the system as a “ black box Use Case 1 Use Case 2 Use Case N Actor System Actors Actor Actors Domain Model In domain analysis , we consider the system as a “ transparent box
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Example: ATM Machine (b) (a) 1 2 3 4 5 6 7 8 9 0 Actor (Bank customer) System Actor (Remote datacenter) ( A T M m a c h i n e ) Concept 2 Concept 1 Actor Concept 3 Concept n Domain Model Actor
Background image of page 4
Building a Domain Model Step 1: Identifying the boundary concepts Step 2: Identifying the internal concepts Actor A Actor B Actor D Actor C Boundary concepts Concept 2 Concept 3 Concept 4 Concept 1 Actor A Actor B Actor C Actor D Concept 1 Concept 2 Internal concepts Concept 3 Concept 5 Concept 4 Concept 6
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Use Case 1: Unlock Use Case UC-1: Unlock Re la te d Re q uire m e nts : REQ 1, REQ 3, REQ 4, a nd REQ 5 s ta te d in Ta b le  2-1 Initia ting  Ac to r: Any o f: Te na nt, La ndlo rd Ac to r’s  G o a l: To  dis a rm  the  lo c k a nd e nte r, a nd g e t s pa c e  lig hte d up a uto m a tic a lly. P a rtic ipa ting  Ac to rs : Lo c kDe vic e , Lig htS witc h, Tim e r Pre c o nditio ns :  The  s e t o f va lid ke ys  s to re d in the  s ys te m  da ta b a s e  is  no n-e m pty.   The   s ys te m   dis pla ys   the   m e nu  o f  a va ila b le   func tio ns ;  a t  the   do o r  ke ypa d  the   m e nu  c ho ic e s  a re  “Lo c k” a nd “Unlo c k.” Po s tc o nditio ns : The  a uto -lo c k tim e r ha s  s ta rte d c o untdo wn fro m  a uto Lo c kInte rva l. Flo w o f Eve nts  fo r Ma in S uc c e s s  S c e na rio : 1. Te na nt/La ndlo rd a rrive s  a t the  do o r a nd s e le c ts  the  m e nu ite m  “Unlo c k” 2. inc lude :: AuthenticateUser  (UC-7) System (a) signals to the Tenant/Landlord the lock status, e.g., “disarmed,” (b) signals to LockDevice to disarm the lock, and (c) 
Background image of page 6
Extracting the Responsibilities Responsibility Description Type Concept Name Coordinate actions of all concepts associated with a use case, a logical grouping of use cases, or the entire system and delegate the work to other concepts. D Controller Container for user’s authentication data, such as pass-code, timestamp, door identification, etc. K Key Verify whether or not the key-code entered by the user is valid. D KeyChecker C
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Domain Model (1) «entity» KeyChecker «control» Controller «entity» Key «entity» KeyStorage Symbolizes worker ”-type concept.
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 21

SElec-5 DomainModel (1) - LECTURE 5: Domain Modeling Ivan...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online