Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Software Engineering Expert

Software Engineering Methodologies Assignment

Purpose: The purposes of the assignment:

1. Understanding a real-time and time-critical system.

2. Understanding Entity Relationship Diagram and Data Flow Diagram in terms of a real time software system.

3. Analyzing a real-time system and the flow of the corresponding software.

Introduction:

The banks in Australia (and most of the other countries having modern banking system) provide the customers to transfer money between two accounts in real time. In most of the Australian banks, the transfer software/app, popularly known as Real-time Money Transfer (RMT), has the identical flow. As for example, a transfer starts after usual login and standard authentication. After that, user selects a recipient for the transfer. Having proper authentication (if required), if the total amount to transfer is less than the current balance of the user, the system transfers the money immediately to the recipient. Some of the system allows the sender to send an email to the recipient to let him know about the transfer. Although the transfer seems to be a straight-forward one, most of the bank enforce additional authentication to ensure the smooth and safe transfer of the money. You are now the in-charge of the development of this software in a new Bank. Your task is to oversee the development of this Real-time system required to ensure secured money transfer.

Description:

The RMT should work according to the following rules:

Step-1: Sender enters the interface after successful authentication

Step-2: Selects the account (multiple account may be linked in one interface) and amount to transfer

Step-3: Select the recipient of the transfer either

a) from an already Save info and move to Step-6, OR

b) by entering the recipient name and account info

Step-4: The bank sends a code in SMS in sender's mobile number (which is already stored in the bank database)

Step-5: Sender retrieves that code from SMS and enters the code in the website/ app and resume the transfer

Step-6: Transfer is completed and a confirmation message is shown.

Your task is to do a Real-Time Structured Analysis for the RMT considering the aforementioned steps and the Special Remark. You are to present your analysis including the following information:

1. An External Entity-Relationship Diagram (ERD) indicating relationships of the RMT and the other external entities in the system.

2. Data and Control Flow Diagrams (DFD/CFDs) - to sufficient detail that only a single task is carried out by each process at the lowest level. You should show the control events that occur on the same diagrams. Use the real-time extensions for control flows etc. shown in the lecture notes. You need to determine when and where events will occur. For example, whenever a piece of data becomes available it may need a control event to let the system know that it is available. These events must be clearly shown in these DFD/CFD diagrams and then handled in the Control Specification (CSPEC).

3. Process Specifications (Pspecs) - a psuedo-code or similar design language specification is required for each process at the lowest level.

4. Control Specifications (Cspec) - use combinational or sequential FSMs as required, presented in an appropriate format. The idea is that the Cspec will completely describe how each and every event or control flow is handled in the system. Note you need to provide both "Process Activation Table" and "State Machine Diagram".

5. A Data Dictionary is required to adequately describe each name or special term used in the analysis, which includes process names, data flow names, control flow names etc. If you think further information is required make reasonable assumptions and clearly state these in the submission.

Software Engineering, Computer Science

  • Category:- Software Engineering
  • Reference No.:- M92072816

Have any Question?


Related Questions in Software Engineering

Instructionsprivacy-preserving data miningdata mining

INSTRUCTIONS PRIVACY-PRESERVING DATA MINING Data mining technology can be exploited to reveal sensitive information from the original data. Thus it is important to preservethe privacy of the parties that the data refer t ...

Research projectin the course we have covered various

RESEARCH PROJECT In the course, we have covered various security and privacy issues that arise in the cyberspace field. We have learned to identify these risks and have discussed the current approaches and developments f ...

The research paper for this course is about some of the

The research paper for this course is about some of the best sources of digital evidence for child abuse and exploitation, domestic violence, and gambling according to the National Institute of Justice. Research commerci ...

Proposaldesign of an efficient gps tracking system tag for

Proposal Design of an efficient GPS Tracking System (tag) for monitoring small species IMPLEMENTING EMBEDDED SYSTEMS USING SYSML Task Using PapyrusSysML Software (Downloadable online - Evaluation Copy- Latest Version) Mo ...

In this assignment you will answer the following questions

In this assignment, you will answer the following questions related to Android platform and Android security design. 1. Describe Android architecture in detail by explaining the four conceptual layers. 2. Describe Androi ...

Assignment part 1objectives to learn to identify the

Assignment Part 1 Objectives: To learn to identify the relevant use cases for a given application, describe the use cases and develop an object-oriented domain model. Problem Statement - Standing Orders Management System ...

Overviewyou are required to modify and logically extend

Overview You are required to modify and logically extend the functionality of a provided code base to implement a game. This requires you to modify the code base as well as create documentation and implement various user ...

Write review on this article with apa formatalthough

Write review on this article with APA format. Although computer crimes are being seen in our society more and more each day, it is still difficult to prosecute people who commit these crimes mainly because everything is ...

Instructions - onion routingin this assignment you will

INSTRUCTIONS - ONION ROUTING In this assignment, you will answer the following questions related to Onion Routing and Tor. 1. Describe the infrastructure of Onion Routing and explain how it works for providing anonymity ...

Write review on this article with apa formatgovernment

Write review on this article with APA format. Government surveillance is a major issue in the United States and globally. Surveillance refers to any collection and processing of personal data, whether, identifiable or no ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As