sem6 comp oose readerhut

55
K.J.SOMAIYA COLLEGE OF ENGINEERING VIDYAVIHAR , MUMBAI – 400 077 Department of Computer Engineering Subject : Object Oriented Software Engineering Term: odd(2010-2011) Class / Sem : T.E Comp / VI List of Experiments Sr no. Exp Title of the Title of the Experiment 1 Requirement Analysis for Mini Project. 2 Feasibility Analysis for Mini project. 3 Requirement and Design Modeling. Use case Diagram Activity Diagram Sequence Diagram Collaboration Diagram State chart Diagram Class Diagram 4 Design Document for Mini Project. 5 Project Plan Document for Mini project. 6 Testing plan for Mini Project. 7 Deployment Document for Mini Project.

Upload: grokesh

Post on 26-Mar-2015

267 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Sem6 Comp Oose ReaderHut

K.J.SOMAIYA COLLEGE OF ENGINEERING

VIDYAVIHAR , MUMBAI – 400 077

Department of Computer Engineering

Subject : Object Oriented Software Engineering

Term: odd(2010-2011) Class / Sem : T.E Comp / VI

List of Experiments

Sr no.Exp Title of the Title of the Experiment

1 Requirement Analysis for Mini Project.

2 Feasibility Analysis for Mini project.

3

Requirement and Design Modeling.

Use case Diagram

Activity Diagram

Sequence Diagram

Collaboration Diagram

State chart Diagram

Class Diagram

4 Design Document for Mini Project.

5 Project Plan Document for Mini project.

6 Testing plan for Mini Project.

7

Deployment Document for Mini Project.

Component Diagram

Deployment Diagram

Page 2: Sem6 Comp Oose ReaderHut

Experiment No :1

Aim: To Prepare Requirement Specification Document

Document:

Introduction

1.1 Purpose READER’S HUT is a library, which provides reading services to its members. This library provides

following facilities to the readers: Granting and renewal of membership. Issue and return of books. Purchase and Updation of books.

While providing the above facilities, the following drawbacks are encountered: Issuing more than 1 book to a member Issuing a book to a member whose membership has expired. Physically searching for required book. Time consuming process.

An online system is to be designed which would overcome drawbacks.

1.2 Scope

The online system to be designed should perform following major functions: Acquisition of books. Membership maintenance. Book issue. Book return. Renewal of membership. Answer management queries.

1.3 Definition and acronyms

TCP/IP: Protocols used for connection.Module: A part of the system which performs a definite task.Server: A part of the client server model. Has higher processing capacity and servicesrequests made by clientClient: A part of the client server model. Requests services from the server.

1.4 References http://www.howstuffworks.com/tcp-ipconnections/1.html

5. Overall Description

2.2 Product Perspective The library management system allows the librarian to perform the tasks of issuing, returning books,

and other tasks related to membership maintenance with an easy to use interface.

Page 3: Sem6 Comp Oose ReaderHut

2.1.1. System InterfacesThe system consists of four modules namely, admin module, client module, server module and the

database module.The server module is a server that accepts connection from the admin module and the client module

and interfaces them both with the database.

2.1.2. User InterfacesThe Admin module and the client module must provide a user interface to the user. The server module

and the database do not have a user interface.

2.1.3. Hardware InterfacesAll components must be able to execute on a personal computer.

2.1.4. Software InterfacesThe admin module and the client module must be java applets running within internet explorer 5(or

higher) or Firefox.The server module must integrate with the DBMS using JDBC. The web server must run within a

server available for Windows NT.

2.1.5. Communication InterfacesThe admin module and the client module must communicate with the server module using TCP/IP

connections.The server and the database components must be located on the same host.

2.1.6. Memory constraintsThe admin module and the client module must be able to run within 64MB. The server module must be

able to run along with the database within 256 MB.

2.1.7. OperationsThe operations of the client module and the admin module must be easy and intuitive to the users. No

specific knowledge must be required to operate the same. The server module must be installed and maintained with no interaction with the existing software on the machine.

Back up operations must be defined.Recovery operations must be specified in terms of user machine failures or database failures.

Page 4: Sem6 Comp Oose ReaderHut

2.1.8. Site adaptation requirements

2.1.8.1 Website requirementFor online reservation of books, application for membership, renewal of membership etc a website

will be required. This website requires purchase of web space.

2.2 Product functionsThe main functions of the library management system are to allow for membership maintenance,

acquisition of books, issuing and returning of books and generating reports.

A member has a unique identification number called the membership number. Membership has an associated expiry date, which is used for notification to users and to the librarian. It also maintains the amount of fine that is collected in the membership period.

The acquisition of books requires assignment of a unique acquisition number for each acquired book and other details such as price, author name etc, which are used for report generation purposes.

The issuing of book requires the verification of membership details and books are issued if the member has a valid membership and has not already issued a book which is not returned yet.

While returning a book, the due date of the book is checked and if necessary fine calculations are done and the database us updated accordingly.

Various reports generated are: List of overdue books. List of memberships expiring in the current month. List of books present in the library. List of members.

2.3 User characteristicsThe users are untrained or have basic knowledge of computer functionalities. Theusers do not have knowledge of software engineering and do not understand the underlying

functions of the system.

2.4 ConstraintsThe system should enforce authentication and guarantee validity and integrity of the database.

2.5 Assumptions and dependenciesNo specific assumptions or dependencies.

6. Specific Requirement

Page 5: Sem6 Comp Oose ReaderHut

3.6 External interface requirement

3.1.1 User InterfaceLogin screen: The login screen consists of user id and password fields and submit and cancel buttons.

Acquisition entry screen: This screen consists of fields like book name, author, price, acquisition number, publisher name, number of pages, date of publish, date of purchase and book status.

Application form: The form consists of Name, address, membership fee and caution money.

Admin screen: The admin screen consists of fields to update or add new data to the database. It consists of fields for updating book status, membership details, generating invoices and report generation.

3.7 Software product features

3.2.1 Membership managementValidity check is performed whenever a membership application is received.The librarian can modify the details of membership like the amount of fine collected etc.

Any errors occurring are reported.

3.2.2 Book managementFor acquisition of books as well as issue and return of books, validity check is performed.Members are allowed to reserve a book for issue. The librarian has to update the book status when

it is returned by the member.Any errors occurring are reported.

3.2.3 Staff accounts managementThe staff accounts consist of staff details and their respective login details. These details are used

while login of staff members. These details can be updated by the librarian.Any errors occurring are reported.

3.2.4 Invoice generation managementWhile generating invoices validity checks are performed to verify the quantity and name of books to

be bought.The librarian has to handle the generation of invoices. Any errors

occurring are reported.

3.2.5 Report generation

3.2.5.1 Overdue Books It consists of following format:

Page 6: Sem6 Comp Oose ReaderHut

S.No. ACCE TITLE PRICE PUBLI MEMB MEMB MEMB BOOK PROPSSION OF OF SHER ERSHI ER ER ISSUE OSEDNUMB BOOK BOOK NAME P NAME ADDR D ON DATEER NUMB ESS OF

ER RETURN

3.2.5.2 Memberships expiring in the current month It consists of following format: S.No. MEMBERSHIP NAME ADDRESS MEMBERSHIP MEMBERSHIP

NO. BEGINNING EXPIRE DATEDATE

3.2.5.3 List of books present in the library It consists of following format:

S.No. ACQ ACCE BOO AUTH AUTH PUBL PRICUISITI SSIO K OR-I OR-II ISHE EON N TITLE NAM NAM RNUM NUM E E NAMBER BER E

NO. DATE DATEOF OF OFPAGE PUBL PURCS ISH HASE

3.2.5.4 List of members It consists of following format: S.No. MEMBE NAME ADDRE DATE DATE MEMBE CAUTIO CUMULRSHIP SS OF OF RSHIP N ATIVENO. MEMBE MEMBE FEE MONEY FINE

RSHIP RSHIP COLLE

Page 7: Sem6 Comp Oose ReaderHut

BEGINS EXPIRY CTED

Page 8: Sem6 Comp Oose ReaderHut

3.8 Performance requirementOur system will be scalable enough to handle the concurrent users accessing through web. We will be

maintaining the resource pools in our system for e.g. connection pools, object pools to achieve scalability. However the response time to various users will vary depending upon the kind and amount of information retrieved.

3.9 Software system attributesMaintainability: The system is to be developed using modular approach, hence it any errors in a

particular module can be easily identified and corrected without any effect on other modules.

Portability: The system is to be developed using java (platform independent tools), hence the system will be portable.

Recoverability: Recovery steps have to be defined in case of system or database failures. For database log based recovery is used.

Security: The system provides password based security.

3.10 Logical database requirementsThe database is required to store all the information about the books in the library, aswell as details about all the members of the library. The database also stores the details of the staff in

the library. It is also required to store the login details of the members as well as the staff of the library.

3.11 Other requirementsNo other specific requirements.

Roll no Signature of Faculty with date

Page 9: Sem6 Comp Oose ReaderHut

Experiment No :2

Aim : To Perform Feasibility Analysis .

Theory:

Feasibility Analysis:

No project should be undertaken without detailed cost estimates and scope controls.  Even if a project is already underway, feasibility analysis can determine likely outcomes well ahead of time.  The following is a brief outline of the feasibility process.

Constraints:

There are four constraints to project success:

1. Cost :The cost incurred in developing this project include the cost of software developers,the system (computers required) and the softwares required.

2. Quality :The developers working on the project are highly skilled .

3. Time :The time taken for the project development is 6 months.

4. Scope: The online system to be designed should perform following major functions:

Acquisition of books. Membership maintenance. Book issue. Book return. Renewal of membership. Answer management queries.

Cost-Effectiveness:

Cost-effectiveness analysis can include the following:

Estimated direct costs:The direct cost includes cost of the softwares required and software developers.

Page 10: Sem6 Comp Oose ReaderHut

Indirect costs: The indirect cost includes training provided to the end user.

Risk Analysis:

Project success depends on meeting the following requirements:

The software developers working on this project are highly skilled and have good experience on current platform being used.

The project is developed using agile project management methodology. Strong project management procedures Contingency plans are developed in case of system failure .

Complexity Analysis:

The complexity of the task assigned to the developers depends upon the experience and job knowledge of developer.

Requirements Definition :

A Requirements Definition gives the rationale, goals and description of a system. It is both a roadmap for the project and criteria for assessing completion. Thus the following task are performed during the project development :

Assess existing operations: Review systems, interview users, discuss options with management.

Review constraints: budget, time, personnel and technical. Evaluate strengths and enabling conditions.

Project Success :

Software projects are inherently risky.  Ethical approaches combined with good management mitigates those risks.

System requirements are discussed with the customer time to time.

The projects is feasible for given budget, time, personnel and technical constraints. The projects include all the factors critical for success: the right goals, the right staff, the

right vendors, the right work breakdown, the right budget and the right schedule.

Page 11: Sem6 Comp Oose ReaderHut

Conclusion:Thus, feasibility analysis is performrd for the project .

Roll no Signature of Faculty with date

Page 12: Sem6 Comp Oose ReaderHut

Experiment No :3

Aim : To Model the requirements using UWE approach.

Theory:

Requirement Modeling:

It is displayed using USE case diagram and activity Diagram.

Use cases It represents the functions of a system from the users point of view.

Use Case Diagram :

Use Case for Administrator:

Use Case for Librarian:

Page 13: Sem6 Comp Oose ReaderHut

Use Case for member:

Use Case for clerk:

Page 14: Sem6 Comp Oose ReaderHut

Use Case for helper:

Page 15: Sem6 Comp Oose ReaderHut

Acivity Diagram

In its basic form, an activity diagram is a simple and intuitive illustration of what happens in a

workflow, what activities can be done in parallel, and whether there are alternative paths

through the workflow. Activity diagrams as defined in the Unified Modeling Language are

derived from various techniques to visually illustrate workflows. Activity diagrams are used

to visualize the workflow of a business use case. A complete workflow description will have

a basic flow, and one or several alternative flows. This workflow has a structure that we can

define textually, using informal if, if-then-else, or does-until statements of various kinds. For

a simple workflow with a simple structure such textual definitions may be quite sufficient,

but in the case of more complex structures, activity diagrams help to clarify and make more

apparent what the workflow is. Historically, activity diagramming techniques have mostly

been used in the business process modeling domain, but this article will also briefly discuss

how you can use it in the system modeling domain.

Basic Activity Diagram Notation:

As common for most notations, the activity diagram notation has some elements that are

necessary for you to understand if you want to be “conversant” about activity diagrams. A

basic activity diagram can have the following element:

Activity states, which represent the performance of a step within the workflow.

Transitions that show what activity state follows after another. This type of transition is

sometimes referred to as a completion transition, since it differs from a transition in that it

does not require an explicit trigger event, it is triggered by the completion of the activity the

activity state represents.

Decisions for which a set of guard conditions are defined. These guard conditions control

which transition of a set of alternative transitions that follows once the activity has been

completed. You may also use the decision icon to show where the threads merge again.

Decisions and guard conditions allow you to show alternative threads in the workflow of a

business use case.

Synchronozation Bars ,which you can use to show parallel subflows .Synchronization bars

allow you to show concurrent threads in the workflow of a business use case.

Page 16: Sem6 Comp Oose ReaderHut

Activity Diagram:

Activity Diagram for librarian:

Page 17: Sem6 Comp Oose ReaderHut

Activity Diagram for clerk:

Page 18: Sem6 Comp Oose ReaderHut

Sequence Diagram: UML defines two types of interaction Diagrams :the Sequence Diagram and the collaboration

diagram. Sequence Diagram shows essentially the same information,but concentrates on the time-

ordered communication between objects rather than their relationships.The dashed vertical lines represent the lifeline io the object.

Sequence Diagram :Sequence Diagram for book return:

.

Page 19: Sem6 Comp Oose ReaderHut

Sequence Diagram for Issue book :

Page 20: Sem6 Comp Oose ReaderHut

Collabrotion Diagrams: In collaboration diagrams,objects are drawn as rectangles and the lines between them

indicates links. A link is an instance of an association.The order of the messages along the links

between the objects is indicated by the number at the head of the message. Collabration Diagrams are spatial representation of objects,links,interactions.

Collabration Diagram:

Page 21: Sem6 Comp Oose ReaderHut

Collabration Diagram:

Page 22: Sem6 Comp Oose ReaderHut

Content Modeling:Content modeling is done using Class Diagram and state diagram.

Class Diagram:

Class diagrams are the most popular UML diagrams used by the object oriented community. It describes the objects in a system and their relationships. Class diagram consists of attributes and functions.

A single class diagram describes a specific aspect of the system and the collection of class diagrams represents the whole system. Basically the class diagram represents the static view of a system.

Class diagrams are the only UML diagrams which can be mapped directly with object oriented languages. So it is widely used by the developer community

Class Diagram :

Page 23: Sem6 Comp Oose ReaderHut

Statechart diagram

Represents the behavior of a class in terms of states at run time.

Statechart diagram define different states of an object during its lifetime. And these states are changed by events. So Statechart diagrams are useful to model reactive systems. Reactive systems can be defined as a system that responds to external or internal events.

Statechart diagram describes the flow of control from one state to another state. States are defined as a condition in which an object exists and it changes when some event is triggered. So the most important purpose of Statechart diagram is to model life time of an object from creation to termination.

State Diagram :

State Chart Diagram for book:

Page 24: Sem6 Comp Oose ReaderHut

Roll no Signature of Faculty with date

Page 25: Sem6 Comp Oose ReaderHut

Experiment No :4

Aim : To Prepare Software Design Description Document

Document:

a. Purpose

READER’S HUT is a library, which provides reading services to its members. This library provides following facilities to the readers:

Granting and renewal of membership. Issue and return of books. Purchase and Updation of books.

While providing the above facilities, the following drawbacks are encountered: Issuing more than 1 book to a member Issuing a book to a member whose membership has expired. Physically searching for required book. Time consuming process.

An online system is to be designed which would overcome drawbacks.

b. Scope

The online system to be designed should perform following major functions: Acquisition of books. Membership maintenance. Book issue. Book return. Renewal of membership. Answer management queries.

c. Definitions and Acronyms

TCP/IP: Protocols used for connection.

Module: A part of the system which performs a definite task.

Server: A part of the client server model. Has higher processing capacity services

requests made by client

Client: A part of the client server model. Requests services from the server.

Referenceshttp://www.howstuffworks.com/tcp-ipconnections/1.html

9Decomposition Descriptiona. Module Description

Page 26: Sem6 Comp Oose ReaderHut

i. Admin Module Description

The admin module allows the user (Librarian) to make changes to the database. It allows him/her the generation of various reports and invoices. It also allows him/her to manage membership accounts.

ii. Client Module Description:

The client module allows the members to login and query the database for available books and for membership details.

It allows for requesting of books.It also provides interface for membership application and renewal.

iii. Server Module Description

The server module interfaces with the database and allows the admin and client module to query information from the database.

All the database operations are performed by the Server module.The client and admin module interface with the server module using TCP/IP connections.

b. Concurrent Process Description i. Admin process description

Admin process starts whenever the Librarian logs in. This process then connects to the Server process and maintains the connection till the librarian logs out. It passes the queries to the server module over the connection.

ii. Client process description

The client process starts whenever any member logs in. This process then connects with the Server Process and maintains the connection till the member logs out. Queries are passed by this process to the Server process over the connection.

iii. Server process description

The Server process is always active, regardless of whether any user has logged in or not. This process accepts connections from the admin and client process and replies with the result set for the queries. It interfaces with the database using JDBC connections.

c. Data Description i. Member

Member entity stores the information about the members of the Library. It is required for validating member information while issuing books and it is updated every time books are issued, returned or fine is to be calculated.

ii. Books

The Book entity stores the information of the books in the library. A new record is created whenever new books are acquired. Book status is updated every time books are issued or returned.

iii. Issuance

Page 27: Sem6 Comp Oose ReaderHut

Issuance entity stores the records of books issued to members. These records are used for calculating fine for delayed returns and to keep a track of books that are issued.

10. Dependency Description a. Inter-Module Dependency

The Admin and Client modules require connecting to the Server module using TCP/IP connections and all the transactions are made using these two modules.

b. Inter-Process Dependency

The Client and Admin processes send queries to the Server process. These queries are then passed on to the Database management system by the Server process using the JDBC connection.

c. Data Dependency

The Issuance records require member id from the member records and acquisition number from the book records. These are necessary to maintain information for issuing books and for calculating fines for members.

11. Interface Description a. Module Interface

i. Admin Module Interface

The admin module interfaces with the server module using the TCP/IP connection. It also provides a user interface for the librarian to manage member accounts as well as for managing the book details.

ii. Client Module Interface

The client module interfaces with the server module using the TCP/IP connections. It also provides a user interface for the member to access membership details and also renew membership.

It also provides a user interface to unregistered members to apply for memberships.

iii. Server Module Interface

The server module interfaces to the client and admin modules through TCP/IP connections. It also interfaces with the database using JDBC.

It does not provide a user interface.It also provides a web server component.

b. Process Interface i. Client Process Interface

The client process interfaces with the server process. The client process requires identification information for connecting to the server process.

ii. Admin Process Interface:

The admin process interfaces with the server process. The client process requires identification information for connecting to the server process. The admin process has higher priority over the

Page 28: Sem6 Comp Oose ReaderHut

client process when it comes to connect to the server.

iii. Server Process Interface

The Server process interfaces with the client and admin process after validating the identification information from the connecting process. The server process also interfaces with the database using JDBC.

12. Detailed Design a. Module Detailed Design i. Admin Module Design

The admin module has following components: Book management

o Updation of book status. o Adding of new books. o Removal of older and damaged books. Membership management o Fine calculation. o Adding new member.o Deleting expired membership records.o Renewing membership Report generation Invoice generation ii. Client Module Design

The client module has the following components: Book search. Membership access. Book reservation.

iv. Server Module Design The server module is designed to provide connectivity to the database. It has the following

components: Database interface Interface for connecting with the admin and client module. The server module is

required to remain active always. The server module has also a web server component that handles the TCP/IP connections and

also provides server side validation.

c. Data Detailed Design i. Members

Attribute name Type Size

Page 29: Sem6 Comp Oose ReaderHut

3.1.1 Membership ID String 103.1.2 Name String 503.1.3 Address String 1003.1.4 Registration date Date 103.1.5 Fee Float 103.1.6 Caution money Float 103.1.7 Membership expiry Date 10

date3.1.8 Renewal amount Float 153.1.9 Password String 20

ii. Books

Attribute name Type Size3.2.1 Acquisition No. String 103.2.2 Accession No. String 103.2.3 Title String 303.2.4 Author 1 String 253.2.5 Author 2 String 253.2.6 Publisher String 253.2.7 Price Float 153.2.8 No. Of Pages Integer 303.2.9 Date of publication Date 103.2.10 Date of purchase Date 10

iii. Issuance

Attribute name Type Size3.3.1 Member ID String 103.3.2 Accession No. String 103.3.3 Date of Issue Date 103.3.4 Date of Return Date 103.3.5 Calculated Fine Float 15

Roll no Signature of Faculty with date

Page 30: Sem6 Comp Oose ReaderHut

Experiment No : 5

Aim: To Prepare Software Project Management Plan

1.1 Project overview:The purpose of the software is to make the library systematic, easy to access and userfriendly.

1.2 Project deliverables:

1. SRS 2. Software project management plan 3. Software design document(data design, architectural design, interface design and procedural

design) 4. Software testing documents(test plan, test cases ) 5. User manuals

2. Project Organization:

2.1 Software Process Model:

WATERFALL MODEL:

Planning Analysis

Design

Implementation Testing

Coding

Page 31: Sem6 Comp Oose ReaderHut

2.2 Roles and Responsibilities:

In order to complete the project successfully, the various tasks are assigned amongst the group members according to there ability. Each member should perform the given task efficiently. The members should give proper design for the code, based on which the functions have to be performed:

Following table shows the roles and responsibilities of the each member:

ROLES NAME RESPONSIBILITIES

Team Leader Kavita Kelkar Design generation

Requirement

gathering

Project Analyzer Prafull Bhosale Analysis Evaluation of codes

Project Manager Yogesh Jadhav Integration andtesting modules

Management ofdatabase

Project Advisors Rahul Bansode Coordinating Development of

user interfacemodule

2.3 Tools and Techniques:

System requirements:

Operating systems: Windows 9x/2000/xpHardware: RAM-256 MB or above Any Intel Processor of 1.0 GHz or above Barcode reader Hub

Front end: ASP.NETBack end: MS SQL SERVER

3. Project management plan:

Page 32: Sem6 Comp Oose ReaderHut

3.1 Tasks:

Sr. Task Description Deliverables Resources Dependencies Risks andNo. and Needed and Contingencies

Milestones Constraints3.1.1 Interacting Get Prepare Developer Coding cannot Fixing of

with the requirement analysis manuals be started appointmentclient specifications report

3.1.2 Development Develop the Actual VS.NET Version of Availability ofactual development and SQL software software v/sapplication of project Server waiting for it

3.1.3 Testing Execute and Validating Code Getting right Availability ofcheck the the code inputs for knowledgeable

table for testingproject respective

modules

3.2 Assignments:ROLES NAME RESPONSIBILITIES

Team Leader Kavita Kelkar Design generation

Requirement

gathering

Project Analyzer Prafull Bhosale Analysis Evaluation of codes

Project Manager Yogesh Jadhav Integration and testing modules

Management ofdatabase

Project Advisors Rahul Bansode Coordinating Development of

user interfacemodule

Page 33: Sem6 Comp Oose ReaderHut

3.3 Timetable:

Tasks Description Days allotted Start date End date

Requirement Collection of 15 Jul 2008 Jul 2008gathering information and

analysisof variousbooks

Designing Front-end using 15 Jul 2008 Jul 2008ASP.NET andback-end usingMS SQL Server

Coding Managing 45 Aug 2008 Sept 2008library systemusing .NET

Testing Testing various 30 Sept 2008 Oct 2008modules

Documentation Generating 15 Oct 2008 Oct 2008different reportsas per

requirements.

Roll no Signature of Faculty with date

Page 34: Sem6 Comp Oose ReaderHut

Experiment No :6

Aim : To prepare SYSTEM TEST DOCUMENT

Test Approaches:

White box testingUsing white-box testing methods, the software engineer can derive test cases that do all of the

following:5. Exercise all independent paths within the module at least once.

6. Exercise all logical decisions for both true and false scenarios.

7. Execute all loops at their boundaries and within their operational loops

8. Exercise all internal data structures to ensure their validity.

Black box testing

Black box testing attempts to find errors in the following categories:

6. Incorrect or missing functions

7. Interface errors

8. Errors in data structures or external database access

9. Performance errors

10. Initialization and termination errors

Unit testing

Unit testing focuses verification effort on the smallest unit of software design – the software module.

Using the component level design description as a guide, important control paths are tested to

uncover errors within the boundary of the module. The unit test is white box oriented, and the steps

can be conducted in parallel for multiple modules.

Integration testing

Interfacing of various modules can cause problems. Data can be lost across an interface, one module may affect the other, and individually acceptable imprecision may be magnified when combined.Integration testing is a systematic technique for constructing the program structure while at the same time conducting tests to uncover errors associated with interfacing. The objective is to take unit tested components and build a program structure that has been dictated by design.

Stress testing

During earlier testing steps, white box and black box techniques result in a thorough evaluation of

Page 35: Sem6 Comp Oose ReaderHut

normal program functions and performance. Stress tests are designed to confront programs with

abnormal situations. Stress testing executes a system in a manner that demands resources in

abnormal quantity, frequency or volume. Essentially, the tester attempts to break the program.

Performance testing

Software that performs the required functions but does not conform to performance requirements is

unacceptable. Performance testing is designed to test run-time performance of software within the

context of an integrated system. Performance testing occurs through all the steps in the

testing process. However, it is not until all system elements are fully integrated that the

true performance of a system can be ascertained.

Security testing

Any computer-based system that manages sensitive information or causes actions that

can harm individuals is a target for improper or illegal penetration. Security testing

attempts to verify that protection mechanisms built into a system will, in fact, protect it from

improper penetration. During security testing, the tester plays the role of the hacker who

desires to penetrate the system. Given enough time and resources, good security testing

will ultimately penetrate a system. The role of the system designer is to make penetration

cost more than the value of the information that will be obtained.

Recovery testing

Many computer-based systems must recover from faults and resume processing within a

pre-specified time. In some cases, a system must be fault-tolerant, i.e. processing faults

must not cause overall system function to cease. In other cases, a system failure must be

corrected within a specified period of time or severe economic damage will occur.

Recovery testing is a system test that forces the software to fail in a variety of ways and

verifies that recovery is properly performed. If recovery is automatic, re-initialization,

check-pointing mechanisms, data recovery and restart are evaluated for correctness. If

recovery requires human intervention, the mean-time-to-repair (MTTR) is evaluated to

determine whether it is within acceptable limits.

Test Plan:

It is a document consisting of different test cases designed for different testing objects and different testing attributes. The plan puts the test in sequential order as per the strategies

Page 36: Sem6 Comp Oose ReaderHut

chosen that is, top down and bottom up. The test plan is matrix of test cases listed in order of its execution.Test Plan is developed to detect and identify potential problems before delivering the Software to its users.The scope of test will be limited just to the boundaries as the white box testing cannot be in detail.

Steps in delivering a Test Plan:

1. Prepare a Test Plan:

Identify members from quality assurance department, users and development to cover testing in full extent.

2. Define Objectives of Testing:

Define objectives of testing and describe how to achieve them. Define which type of testing is to be done and how will we be doing that. Define some testing milestones. Prepare detailed test plan considering milestones.

3. Development of a Test Plan:Develop test data, input, event or transaction and expected output for each test under consideration.

4. Perform Test Analysis:After preparing test cases perform testing and examine test output and document the result. The report will contain list with class, type and severity of defect.

Page 37: Sem6 Comp Oose ReaderHut

Test Cases:

Type of testing

Item to be Input Expected Actual Output

tested Output

1.Login form Username: Welcome Welcome

admin

password:

******

Username: Re-enter Re-enter

_12admin username username

password: Password Password

* invalid. invalid.

Unit testing

2.Renewal form Member Accept ID Accept ID

ID:RH123

Member Invalid ID Invalid ID

ID:SS1213 Re-enter the ID Re-enter the ID

3.Application Name: ABC Accept Accept

form

Name: _____ Error. Name field Error. Name field

can’tb

left can’tb

left

Page 38: Sem6 Comp Oose ReaderHut

blank. blank.

Integration 1. Connectivity Click on Page under Page under

testing hyperlink construction construction

Click on New page opens New page opens

hyperlink

2. Querying Post query Triggers an Triggers an

event event

Post query Data not found Data not found1.login failure Backup system Backup system

at work at work

System testing Data lost Data lost2. Security Unauthorized Unauthorized

access accessWelcome WelcomeMr.Administrator Mr.Administrator

Critical Credit card no Credit card Credit card

Beta testingapplications accepted accepted

Expired Credit Credit card Credit cardcard no rejected. rejected.

Alpha testingPassword Password entry Password Passwordencryption accepted safely accepted safely

Experiment No :7

Aim : To prepare Deployment Document.

Theory:Deployment Plan is a ‘how-to’ guide to implement a solution into a live production environment.

It provides detailed deployment guidelines and helps drive the deployment phases.

Deployment Planning :

Page 39: Sem6 Comp Oose ReaderHut

Careful planning ensures that the system is installed smoothly, on schedule, without any significant problems, and to the complete satisfaction of the customer. Specific objectives are to complete the plans for:

  contingencies to cover for unexpected problems, software deployment, deployment and warranty support services. 

Environment Set-Up: The system is designed to run over the Internet and viewed through

browsers such as Netscape or MS Internet Explorer (MSIE). The software is to be created primarily by the use of Java Servlets and other Java components (Beans, JSPs . . . ). This system can be upgraded easily to support internet accessibility.

As with any internet program, a web server is needed. Although we could have used the free Apache web server with JRun as the Java Virtual Machine, we prefer to use IBM’s Java Web Server because of its simplicity. The servlets reside on the Web server. It is the web server that takes the majority of traffic,

We will transfer the existing Customer database and Product/Service database to Oracle 8i. In addition to the existing databases, the new data storage area for invoice transactions will be on Oracle. Oracle and the Web server are directly connected via a gigabit Ethernet.

The user need to be connected to the network. we suggest using a hub-based network. All the client computers are connected to the hub, which is in tern connected to the web server.

Installation and Configuration : Windows operating system. Web browser Netscape or IE. Oracle 8i. Configuring web server.

Rollout to End-Users :This module helps facilitates traning to end users .

Customization Modeling :

Component diagram.

Page 40: Sem6 Comp Oose ReaderHut

Component diagrams document physical elements. Components are wired together by using an assembly connector to connect the required interface of one component with the provided interface of another component. This illustrates the service consumer - service provider relationship between the two components.

An assembly connector is a "connector between two components that defines that one component provides the services that another component requires. An assembly connector is a connector that is defined from a required interface or port to a provided interface or port."

When using a component diagram to show the internal structure of a component, the provided and required interfaces of the encompassing component can delegate to the corresponding interfaces of the contained components.

A delegation connector is a "connector that links the external contract of a component (as specified by its ports) to the internal realization of that behavior by the component’s parts."

Components diagrams can be used to illustrate the structure of arbitrarily complex systems. The following example illustrates what a typical Insurance policy administration system might look like:

It is possible to envisage that each of the components depicted in the above diagram will, in turn, have other component diagrams illustrating their internal structure.

Component Diagram:

Page 41: Sem6 Comp Oose ReaderHut

Deployment Diagram:Deployment Diagram documents hardware elements .Deployment diagram in the UML serves

to model the physical deployment of artifacts on deployment targets .

Deployment Diagrams show “the location of artifacts to nodes according to the deployments defined between them.

Deployment of an artifacts to a node is indicated by placing the artifact inside the node.

Page 42: Sem6 Comp Oose ReaderHut

Instances of nodes are used in deployment diagram to indicate multiplicity of this node.

Deployment Diagram:

Roll no Signature of Faculty with date