These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 1
Software Engineering: A Practitioner’s Software Engineering: A Practitioner’s Approach, 6/eApproach, 6/e
Chapter 7Chapter 7Requirements EngineeringRequirements Engineering
copyright © 1996, 2001, 2005
R.S. Pressman & Associates, Inc.
For University Use OnlyMay be reproduced ONLY for student use at the university level
when used in conjunction with Software Engineering: A Practitioner's Approach.Any other reproduction or use is expressly prohibited.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 2
Requirements Engineering-IRequirements Engineering-I InceptionInception—ask a set of questions that —ask a set of questions that
establish …establish … basic understanding of the problembasic understanding of the problem the people who want a solutionthe people who want a solution the nature of the solution that is the nature of the solution that is
desired, and desired, and the effectiveness of preliminary the effectiveness of preliminary
communication and collaboration communication and collaboration between the customer and the between the customer and the developerdeveloper
ElicitationElicitation—elicit requirements from all —elicit requirements from all stakeholdersstakeholders
ElaborationElaboration—create an analysis model that —create an analysis model that identifies data, function and behavioral identifies data, function and behavioral requirementsrequirements
NegotiationNegotiation—agree on a deliverable system —agree on a deliverable system that is realistic for developers and customersthat is realistic for developers and customers
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 3
Requirements Engineering-IIRequirements Engineering-II SpecificationSpecification—can be any one (or more) of —can be any one (or more) of
the following:the following: A written documentA written document A set of modelsA set of models A formal mathematicalA formal mathematical A collection of user scenarios (use-A collection of user scenarios (use-
cases)cases) A prototypeA prototype
ValidationValidation—a review mechanism that —a review mechanism that looks forlooks for
errors in content or interpretationerrors in content or interpretation areas where clarification may be areas where clarification may be
requiredrequired missing informationmissing information inconsistencies (a major problem inconsistencies (a major problem
when large products or systems are when large products or systems are engineered)engineered)
conflicting or unrealistic conflicting or unrealistic (unachievable) requirements. (unachievable) requirements.
Requirements managementRequirements management
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 4
InceptionInception
Identify stakeholdersIdentify stakeholders ““who else do you think I who else do you think I
should talk to?”should talk to?” Recognize multiple points of Recognize multiple points of
viewview Work toward collaborationWork toward collaboration The first questionsThe first questions
Who is behind the request for Who is behind the request for this work?this work?
Who will use the solution?Who will use the solution? What will be the economic What will be the economic
benefit of a successful solutionbenefit of a successful solution Is there another source for the Is there another source for the
solution that you need?solution that you need?
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 5
Eliciting RequirementsEliciting Requirements meetings are conducted and attended meetings are conducted and attended
by both software engineers and by both software engineers and customerscustomers
rules for preparation and participation rules for preparation and participation are establishedare established
an agenda is suggested an agenda is suggested a "facilitator" (can be a customer, a a "facilitator" (can be a customer, a
developer, or an outsider) controls the developer, or an outsider) controls the meetingmeeting
a "definition mechanism" (can be work a "definition mechanism" (can be work sheets, flip charts, or wall stickers or an sheets, flip charts, or wall stickers or an electronic bulletin board, chat room or electronic bulletin board, chat room or virtual forum) is usedvirtual forum) is used
the goal is the goal is to identify the problemto identify the problem propose elements of the solutionpropose elements of the solution negotiate different approaches, andnegotiate different approaches, and specify a preliminary set of specify a preliminary set of
solution requirementssolution requirements
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 6
Eliciting RequirementsEliciting Requirements
Use QFD to prioritize
requirements
informally prioritize
requirements
formal prioritization?
Create Use-cases
yes noElic it requirements
write scenario
define actors
complete template
draw use-case diagram
Conduct FASTmeetings
Make lists offunctions, classes
Make lists ofconstraints, etc.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 7
Quality Function Quality Function DeploymentDeployment
Function deploymentFunction deployment determines the “value” (as determines the “value” (as perceived by the customer) of each function perceived by the customer) of each function required of the systemrequired of the system
Information deploymentInformation deployment identifies data objects identifies data objects and eventsand events
Task deploymentTask deployment examines the behavior of the examines the behavior of the systemsystem
Value analysisValue analysis determines the relative priority of determines the relative priority of requirementsrequirements
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 8
Elicitation Work ProductsElicitation Work Products a statement of need and feasibility.a statement of need and feasibility. a bounded statement of scope for the system or product.a bounded statement of scope for the system or product. a list of customers, users, and other stakeholders who a list of customers, users, and other stakeholders who
participated in requirements elicitation participated in requirements elicitation a description of the system’s technical environment.a description of the system’s technical environment. a list of requirements (preferably organized by function) a list of requirements (preferably organized by function)
and the domain constraints that apply to each.and the domain constraints that apply to each. a set of usage scenarios that provide insight into the use a set of usage scenarios that provide insight into the use
of the system or product under different operating of the system or product under different operating conditions.conditions.
any prototypesany prototypes developed to better define requirementsdeveloped to better define requirements.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 9
Use-CasesUse-Cases A collection of user scenarios that describe the thread of usage of a A collection of user scenarios that describe the thread of usage of a
systemsystem Each scenario is described from the point-of-view of an “actor”—a Each scenario is described from the point-of-view of an “actor”—a
person or device that interacts with the software in some wayperson or device that interacts with the software in some way Each scenario answers the following questions:Each scenario answers the following questions:
Who is the primary actor, the secondary actor (s)?Who is the primary actor, the secondary actor (s)? What are the actor’s goals?What are the actor’s goals? What preconditions should exist before the story begins?What preconditions should exist before the story begins? What main tasks or functions are performed by the actor?What main tasks or functions are performed by the actor? What extensions might be considered as the story is described?What extensions might be considered as the story is described? What variations in the actor’s interaction are possible?What variations in the actor’s interaction are possible? What system information will the actor acquire, produce, or change?What system information will the actor acquire, produce, or change? Will the actor have to inform the system about changes in the external Will the actor have to inform the system about changes in the external
environment?environment? What information does the actor desire from the system?What information does the actor desire from the system? Does the actor wish to be informed about unexpected changes?Does the actor wish to be informed about unexpected changes?
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 10
Use-Case DiagramUse-Case Diagram
homeowner
Arms/ disarms system
Accesses system via Internet
Reconfigures sensors and related
system features
Responds toalarm event
Encounters anerror condition
system administrator
sensors
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 11
Building the Analysis ModelBuilding the Analysis Model
Elements of the analysis modelElements of the analysis model Scenario-based elementsScenario-based elements
Functional—processing narratives for software Functional—processing narratives for software functionsfunctions
Use-case—descriptions of the interaction between Use-case—descriptions of the interaction between an “actor” and the systeman “actor” and the system
Class-based elementsClass-based elements Implied by scenariosImplied by scenarios
Behavioral elementsBehavioral elements State diagramState diagram
Flow-oriented elementsFlow-oriented elements Data flow diagramData flow diagram
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 12
Class DiagramClass Diagram
Sensor
name/id type location area characteristics
identify() enable() disable() reconfigure()
From the From the SafeHomeSafeHome system … system …
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 13
State DiagramState Diagram
Figure 7.6 Preliminary UML state diagram for a photocopier
Initialization
system status=“not ready” display msg = “please wait” display status = blinking
entry/ switch machine on do: run diagnostics do: initiate all subsystems
turn copier “on“
subsystems ready system status=“Ready”
display msg = “enter cmd” display status = steady
entry/ subsystems ready do: poll user input panel do: read user input do: interpret user input
Readingcommands
system status=“Copying” display msg= “copy count =” display message=#copies display status= steady
entry/ start copies do: manage copying do: monitor paper tray do: monitor paper flow
Making copies
start copies
system status=“Jammed” display msg= “paper jam” display message=location display status= blinking
entry/ paper jammed do: determine location do: provide corrective msg. do: interrupt making copies
problem diagnosis
paper jammed
system status=“load paper” display msg= “load paper” display status= blinking
entry/ paper empty do: lower paper tray do: monitor fill switch do: raise paper tray
load paper
paper tray empty
not jammed
paper full
turn copier “off”
not jammed
copies complete
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 14
Analysis PatternsAnalysis PatternsPattern name:Pattern name: A descriptor that captures the essence of the pattern. A descriptor that captures the essence of the pattern.
Intent:Intent: Describes what the pattern accomplishes or represents Describes what the pattern accomplishes or represents
Motivation:Motivation: A scenario that illustrates how the pattern can be used to A scenario that illustrates how the pattern can be used to address the problem.address the problem.
Forces and context:Forces and context: A description of external issues (forces) that can A description of external issues (forces) that can affect how the pattern is used and also the external issues that will be affect how the pattern is used and also the external issues that will be resolved when the pattern is applied. resolved when the pattern is applied.
Solution:Solution: A description of how the pattern is applied to solve the A description of how the pattern is applied to solve the problem with an emphasis on structural and behavioral issues.problem with an emphasis on structural and behavioral issues.
ConsequencesConsequences: Addresses what happens when the pattern is applied : Addresses what happens when the pattern is applied and what trade-offs exist during its application.and what trade-offs exist during its application.
DesignDesign: Discusses how the analysis pattern can be achieved through : Discusses how the analysis pattern can be achieved through the use of known design patterns.the use of known design patterns.
Known usesKnown uses: Examples of uses within actual systems.: Examples of uses within actual systems.
Related patternsRelated patterns: On e or more analysis patterns that are related to : On e or more analysis patterns that are related to the named pattern because (1) it is commonly used with the named the named pattern because (1) it is commonly used with the named pattern; (2) it is structurally similar to the named pattern; (3) it is a pattern; (2) it is structurally similar to the named pattern; (3) it is a variation of the named pattern.variation of the named pattern.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 15
Negotiating RequirementsNegotiating Requirements
Identify the key stakeholdersIdentify the key stakeholders These are the people who will be involved in the These are the people who will be involved in the
negotiationnegotiation Determine each of the stakeholders “win Determine each of the stakeholders “win
conditions”conditions” Win conditions are not always obviousWin conditions are not always obvious
NegotiateNegotiate Work toward a set of requirements that lead to “win-Work toward a set of requirements that lead to “win-
win”win”
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 16
Validating Requirements-IValidating Requirements-I Is each requirement consistent with Is each requirement consistent with
the overall objective for the the overall objective for the system/product?system/product?
Have all requirements been specified Have all requirements been specified at the proper level of abstraction? at the proper level of abstraction? That is, do some requirements provide That is, do some requirements provide a level of technical detail that is a level of technical detail that is inappropriate at this stage?inappropriate at this stage?
Is the requirement really necessary or Is the requirement really necessary or does it represent an add-on feature does it represent an add-on feature that may not be essential to the that may not be essential to the objective of the system?objective of the system?
Is each requirement bounded and Is each requirement bounded and unambiguous?unambiguous?
Does each requirement have Does each requirement have attribution? That is, is a source attribution? That is, is a source (generally, a specific individual) noted (generally, a specific individual) noted for each requirement? for each requirement?
Do any requirements conflict with Do any requirements conflict with other requirements?other requirements?
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by R.S. Pressman & Associates, Inc., copyright © 1996, 2001, 2005 17
Validating Requirements-IIValidating Requirements-II Is each requirement achievable in the Is each requirement achievable in the
technical environment that will house technical environment that will house the system or product?the system or product?
Is each requirement testable, once Is each requirement testable, once implemented?implemented?
Does the requirements model properly Does the requirements model properly reflect the information, function and reflect the information, function and behavior of the system to be built.behavior of the system to be built.
Has the requirements model been Has the requirements model been “partitioned” in a way that exposes “partitioned” in a way that exposes progressively more detailed progressively more detailed information about the system.information about the system.
Have requirements patterns been Have requirements patterns been used to simplify the requirements used to simplify the requirements model. Have all patterns been model. Have all patterns been properly validated? Are all patterns properly validated? Are all patterns consistent with customer consistent with customer requirements?requirements?