4)  Examples

a)  Business Examples: How the purpose affects the other strategy parameters

Suppose the software to be developed and measured is a distributed 3-layer business application system. The context is a contract with a supplier that stipulates that for payment purposes, software sizes will be measured at the level of whole applications, ignoring any component structure.

Case 1.

Purpose: to measure the size of a delivered application for contract payment

Scope: The FUR of the one application

Functional users: Human users and any other interfacing applications

Level of decomposition: None

Layer: Application, i.e. view a) as in Figure 5.2

Case 2.

Purpose: to measure the size of each major component of the distributed application so that the supplier can estimate the project effort, because each component will be developed using a different technology.

Scope: Each component is measured separately (i.e. there are three measurement scopes).

Functional Users: Refer to the three layers as in Figure 5.2 View b)

The User Interface component has the Human users and the Business Rules component as its functional users

The Business Rules component has the User Interface and the Data Services components as its functional users

The Data Services component has the Business Rules component and any other interfacing applications as its functional users.

Level of Decomposition: First-level decomposition of an application (‘level 1’)

Layers: See the three layers as in Figure 5.2 View b)

b)  Real-time Examples: How the purpose affects the other strategy parameters

The functionality of the software embedded in a hardware device used by humans, for example a combined computer printer/copier can be measured from the viewpoints of two types of functional users. (In both cases assume that we are not interested in any component structure of the software nor any firmware that the embedded software may use.)

Case 1.

Purpose: to measure the size of functionality available to the human user (the ‘consumer offering’ for Marketing), so as to compare against the offering of competitive products.

Scope: Functionality available to human operator users (i.e. excluding functionality needed by operators over which they have no control or cannot ‘see’, such as some functions needed by the printer to communicate with a computer)

Functional Users: Human operator users

Case 2.

Purpose: to measure the functionality that the embedded software developer must provide for the device to function

Scope: All the functionality of the embedded software

Functional users: All hardware devices with which the software must interact (e.g. keyboard, control buttons, screens, print drive mechanism, paper transport mechanism, etc., any computer that the printer must communicate with and the printer driver software).

c) Examples of events

Suppose a soccer (football) match. The FUR of three different software applications could have quite different views of the events that happen at the match.

Application A allows reporters to enter the results of football matches for a newspaper. The only event that the FUR recognizes is ‘match finished’.

Application B is a ‘live reporting’ system that enables a reporter to enter comments that are transmitted over the web to on-line users of the application about anything the reporter considers significant that happens during the match, e.g. kick-off, a goal scored, foul, injury, etc. The only event that the FUR recognizes is ‘anything that happens about which the reporter enters a comment to Application B’.

Application C allows real-time monitoring of the performance of the players. Each player carries a GPS position-sensing device and a heart-beat monitor, which transmits data at regular very short intervals. The only event that the FUR recognizes is a ‘tick’ of the clock that controls the transmission of data on the current position and heart rate of each player at each ‘tick’ to the application C.

Note that each of the three FUR recognizes only one event-type but it is a different event-type for each FUR. In terms of event-occurrences, App A expects one occurrence for each match, App B expects several tens per match, and App C expects several tens of thousands per match.

Business Example: Mapping A Personnel System

Outline statement of requirements. A system is required to enable personnel staff to hold and maintain data about employees, including their salary and the history of their salary progression over time. [The statement also describes the data (attributes) to be recorded about each employee and their validation criteria, but most of this detail need not concern the measurer in this simple example.] A report is required each month listing all employees by name and their current salary, the total number of employees, and the total current salary cost.

Measurement strategy parameters

Measurement purpose: An accurate functional size measurement of the Personnel System for project effort estimating.

Measurement scope: The whole system as specified in the statement of requirements.

Functional users: Personnel staff.

Layer: Application layer.

Level of decomposition: no decomposition.

Mapping phase

Some assumptions:

  • The data structure of the Business Example in figure 6.4 applies.
  • Each employee will be allocated a unique ID by a member of personnel. The key of an ‘employee salary history’ record is [employee ID, salary start date].
  • The word ‘maintain’ in the outline statement of requirements normally implies that there must be Create, Read, Update and Delete functional processes (remember the ‘CRUD’ acronym?) for each object of interest. ‘Update’ will enable a change of any attribute except the key attribute(s) of any data group.
  • There are two objects of interest (‘employee’ and ‘employee salary history’) about which persistent data must be held. The four ‘CRUD’ functional processes will be identified to maintain the employee base data.
  • Also assume that an employee salary history record must be created when an employee first starts work. Subsequently, an employee’s salary may be updated at any time, i.e. not just when the employee base data must be updated. So there is no need for separate ‘create’, or ‘delete’ functional processes for the employee salary history. However, there is a need for an ‘update employee salary’ functional process and for a separate ‘read’ functional process for enquiries on employee salary data. Adding in the process to produce the monthly report means the requirements can be satisfied by 7 functional processes. (see below the analysis of four of these.)
  • In practical situations there may also be FUR for a ‘read’ functional process to display the employee’s base data separately from the enquiry to display the employee’s salary history. Also, when an employee leaves, the ‘delete’ functional process may be required to archive the employee base and salary history data, rather than actually delete it. Ignore these possible requirements for simplicity.
  • Note also as a general rule when measuring on-line business applications, that ‘menus’ that only assist navigation and the selection of functional processes, and ‘blank’ data entry screens should be ignored. It is the movement of data by Entries, Exits, Reads and Writes that must be identified for measurement purposes.
  1. Analysis of functional process ‘Create employee’.

The FUR is to enter data for a new employee.

(The examples show the data movements and the data group that each of them moves).

Functional process ‘Create employee’. Triggering event: a new person is employed

Triggering Entry  : Employee base data

Entry                    : Initial salary and its start date

Read                    : Employee base data (to check that no employee already exists with the entered ID)

Write                    : Employee base data

Write                    : Employee salary history (a new record is created when the salary is first entered)

Exit                      : Error/confirmation messages (There must be error messages for various validation failures and also some form of confirmation on successful data entry. Include one Exit to account for all such messages.)

  1. Analysis of ‘Read and Update employee data’ processes, including possible salary update

Assume a user will first wish to retrieve and display the employee’s base data, before entering a change to one or more attributes, including maybe a new salary. This procedure will require two functional processes. The first is triggered by the event of the user deciding to display the existing data; it is the ‘read employee base data’ functional process. The second is triggered by the event that one or more attribute(s) of the employee have changed in the real world; it is the ‘update employee base data’ functional process. The two functional processes are:

Functional process ‘Read employee data’. Triggering event: Decision to display existing data

Triggering Entry  : Employee ID

Read                    : Employee base data

Read                    : Employee salary history

Exit                      : Employee base data

Exit                      : Employee salary history

Exit                      : Error/confirmation messages (in case a non-existent ID was entered)

Functional process ‘Update employee data’. Triggering event: Employee data has changed in some way

Triggering Entry  : Updated employee base data (for the update of one or more attribute(s))

Entry                    : Updated salary and its start date

Write                    : Employee base data (the updated record)

Write                    : Employee salary history (a new record is created if the salary has been updated)

Exit                      : Error/confirmation messages (for entry of invalid data or the possible failure of the update)

  1. Analysis of the process to produce the monthly report for the payroll department

Functional process ‘End-of-month employee’ report. Triggering event: The end of the month

Triggering Entry  : End of month time signal (every functional process must have a triggering Entry, even though this one conveys no variable data)

Read                    : Employee base data (to get employee ID’s and names)

Read                    : Employee salary history (to obtain the current salary)

Exit                      : Employee current salary (one line for each employee with their ID, name and salary

Exit                      : End-of-month employee totals (of number of employees and of their total salary)

Notes: the final Exit moves a data group describing the object of interest ‘All employees’. No data is stored about this object of interest, but the object of interest is a group of real people, i.e. a real ‘thing’ in the world of the functional user.

An error message for this functional process wasn’t counted as there does not seem to be any reason for the application to have to generate such a message. (The operating system might generate an error message if the data cannot be found, but this is not part of the application.)

Real-time Example: A Domestic Alarm System

Outline statement of requirements

Deduce the functionality available to normal house occupants and allocated to software from knowing how to use the system and by examining it physically. Ignore the functionality provided for the alarm maintenance engineer, as well as the functions to set up the system when it is first installed.

The main purpose of the alarm system is, when it is activated, to start one or two sirens (devices that make a loud noise) if a sensor detects a movement inside the house or if the front door is opened.

The software supports the alarm system’s human interface via a keypad and red/green LED’s. The software also accepts data from a device that can sense whether the main front door of the house is open or not, and from several internal movement detectors. (The alarm system can handle any number up to 10 movement detectors. The number does not matter for this analysis as they are all identical and equivalent.) The alarm system also controls an internal and an external siren.

The alarm system is always powered ‘on’, but is not ‘active’, i.e. the movement detectors and the front door sensor are not working, unless the system is activated by the occupant. When the system is activated, either the software waits in a state where it can receive signals from these sensors, or the software polls the sensors to obtain their state. We do not know which process is used and it does not matter for the functional size measurement.

To activate and de-activate the alarm system, the house occupant must enter the correct PIN (Personal Identification Number) within a pre-set time. The PIN is stored by the software and can be changed, so there must be some persistent storage. When the first digit of a PIN is entered, the internal siren is started; this siren is stopped on entry of all digits of the correct PIN. If the wrong PIN is entered three times or if the correct PIN is not entered within the pre-set time, the external siren is also started.

There is a battery to provide continuity if the electricity power supply fails, so there must be a power voltage detector.

The green LED is illuminated when power is switched on. If a siren is started or if the power fails, the green LED is switched off and the red LED is illuminated.

As certain functions must be completed within pre-set times, there must be a clock mechanism. For example, if the alarm system is activated before leaving the house, the occupants must leave and close the front door within a pre-set number of seconds; if not, the sirens are started. The external siren must not continue for more than the legal limit of 20 minutes.

It is not known how the clock is implemented but assume a software implementation for simplicity, which starts whenever needed. The functionality to keep track of elapsed times is then a form of data manipulation, which can be ignored.

Measurement strategy parameters

Purpose of the measurement: To measure the functional processes of the embedded application software available to the house occupant for normal operation.

Measurement scope: The alarm system embedded application software functions available to the house occupant for normal operation. Ignore an operating system.

Functional users: A context diagram shows the hardware functional users and how they interact with the software. Note that the movement detectors are all functionally identical, so do not need to be distinguished. The human user of the alarm system, referred to as ‘the occupant’ is not a functional user; he/she interacts with the application only via the keypad and the audible and visual signals.

Layer: Application.

Level of decomposition: no decomposition.

Figure  6.5 – The Domestic Alarm System Context Diagram

The functional processes: After initial set-up, the alarm system application provides the occupant with nine functional processes. These can be identified by considering the events that the software must respond to.

  • The occupant wishes to change the existing PIN.
  • The occupant wishes to leave the house and activate the alarm system.
  • The front door sensor detects that the door has been opened whilst the alarm system is activated.
  • The occupant wishes to activate the alarm system whilst he/she is in the house, e.g. when retiring at night, out of range of the movement detectors.
  • The occupant wishes to deactivate the alarm system when inside the house, e.g. when getting up in the morning before moving within range of the movement detectors.
  • A movement detector signals a movement whilst the alarm system is activated (which starts the internal siren).
  • The occupant wishes to cancel the siren(s) and to deactivate the alarm system by entering the correct PIN following events 3) or 6).
  • The power voltage detector signals failure of the mains electrical supply
  • The power voltage detector signals restoration of the mains electrical power supply.

Analysis of an example functional process:

Analysis  of event 3) on the list above (the front door is opened whilst the alarm system is activated). When the front door sensor detects this event, the internal siren starts; the correct PIN code must then be entered within a pre-set time to de-activate the system and to stop the internal siren. If the PIN code isn’t entered before the pre-set time, or the wrong code is entered more than three times, the external siren also starts. The functional process has the following data movements.

Functional process: Possible intruder detected. Triggering event: Door opens whilst alarm system is activated.

Triggering Entry  : ‘Door open’ message from the front door sensor

Read                    : Get PIN from persistent storage

Exit*                     : Message to switch green LED from ‘on’ to ‘off’

Exit*                     : Message to switch red LED from ‘off’ to ‘on’

Exit                      : Message to start the internal siren

Entry                    : PIN code entered (If the wrong code is entered, the user may enter the PIN two more times but the process is always the same so it is only measured once.)

– **                       : Message to switch red LED from ‘on’ to ‘off’ (on successful entry of PIN)

– **                       : Message to switch green LED from ‘off’ to ‘on’ (on successful entry of PIN)

Exit                      : Message to stop internal siren (on successful entry of PIN)

Exit                      : Message to start external siren (after three unsuccessful PIN entries, or if the PIN is not entered in time)

Exit                      : Message to stop the external siren (after 20 minutes, a legal requirement)

NOTES: (*) The green and red LEDs are different types as they are subject to different functional user requirements, therefore identify two functional user types. (**) These are repeat occurrences of the Exits to the LEDs earlier in the process, but with different data values (‘on’ instead of ‘off’, and vice versa).

d)             Some general lessons from these examples

  • Implementation details are generally irrelevant to the Mapping Process. For example the functional processes of the personnel system could be implemented in many ways, all leading to the same data movements in the COSMIC model. Similarly, it is not necessary to know how the ‘door open’ message triggers the process of the Domestic Alarm system. (Either the software, when activated, could poll the front door sensor and the movement detectors to ascertain their status, or these sensors could send their status to the software.)
  • It helps understanding to write out the data movements of a functional process in roughly the sequence they would be executed. But the actual sequence will be more complicated in practice. For example the validation of the data entered in the personnel system could be interspersed with the issue of error message occurrences.
  • The examples illustrate the part of the definition of a functional process that states that ‘The set of all data movements of a functional process is the set that is needed to meet its FUR for all the possible responses to its triggering Entry’. In the personnel system process that updates an employee data, a new salary history record is created only if the employee’s salary is changed. In the alarm system functional processes, messages sent to the LED’s and/or to the sirens will depend in each case on whether the occupant entered the correct PIN or not. The measurer’s only task is to identify all the data movements that are needed by a functional process to meet the FUR for all of its possible responses to all the data it may receive in its Entries and Reads. The measurer does not have to worry about the sequence of the data movements, nor whether they are needed or not in any particular occurrence of the functional process which will depend on the data values entered.
  • The alarm system case is an example where the object of interest of each data group entering or exiting the software is also the functional user that sent the group or that receives it (i.e. the functional user is sending or receiving data about itself). In these cases, having identified the functional users in the Measurement Strategy phase, the objects of interest have been identified as well.

I suggest to replace each example by a link to the example text at the end’. It enables the reader either to skip the example so as to get a quick overview of the method, or to study it with the examples.