Sie sind auf Seite 1von 28

Principles of

Engineering System Design

Dr T Asokan

asok@iitm.ac.in
INTRODUCTION TO SYSTEMS DESIGN

Functional Decomposition using


IDEF0 diagram: Example
Example:
Unified Data REcording System - UDARE
Objectives:
• Online recording and compilation of attendance for students/staff/faculty on
day‐to‐day basis.
• Real time analysis of slot‐wise engagement of students/faculty.
• Serve as a real time data base for leave/salary/scholarship computation.
• Serve as a real time data base for students’ feedback on courses/ feedback analysis.
• Serve as a real time centralized data base for fees records of all students.
• A real time data base for venue allocation/time slots for year long Lit‐Soc
activities happening in the institute
Use U-Dare
Services Software
regulations
Request
Services

Provide U-
Dare Services

Main Maintenance
Students Staff Faculty Internet server
personnel
server
A-0 Context diagram
User Identity
Authentication A1

Accept User
Request A2

Provide Services
A3

User Identity
Provide utility
Authentication
services (A4)A4

Maintain
Services A5
A0 diagram:

Network database Power supply

Data search User Identity Feedback


request Authentication
(A1) Accept user
request/provid
Display data
Navigation e feedback
request (A2)
Control Provide navigation
Cashless operation (A3) services
transaction
Provide utility Enable cashless
request
services (A4) transaction

Maintenance
Maintenance and repair (A5) Proper functioning
services

UDARE
SYSTEM
A0 diagram:
Networkdatabase Power supply

Datasearch User Identity Feedback


request Authentication
(A1) Accept user
request/provid
Displaydata
Navigation efeedback
request (A2)
Control Providenavigation
Cashless operation(A3) services
transaction
Provideutility Enablecashless
request
services(A4) transaction

Maintenance
Maintenance andrepair (A5) Proper functioning
services

UDARE
SYSTEM
A3 diagram:

Network database Power supply

Data search Feedback


request
Process
request
Navigation (A31)
request Search for Provide navigation
data (A32) details
Cashless
transaction Extract data Display
request (A33) information

Transaction details
UDARE
A3 diagram:

Network database Power supply

Data search Feedback


request
Process
request
Navigation (A31)
request Search for Provide navigation
data (A32) details
Cashless
transaction Extract data Display
request (A33) information

Transaction details
UDARE
A32 diagram:

Network Power
database supply

Login and Connect to the


password network (A321)
Search for desired
data in the network Extract data from
database (A322) the network

UDARE
A32 diagram:

Network Power
database supply

Login and Connect to the


password network (A321)
Search for desired
data in the network Extract data from
database (A322) the network

UDARE
A322 diagram

Network Power supply


database

Find the category


Connect to the of the information
network asked by the Collect data from
user the corresponding
A3321 Extract
category
data
(academic/
administrative/
general) A3322

UDARE
Network Power supply
database

Find the category


Connect to the of the information
network asked by the Collect data from
user the corresponding
A3321 Extract
category
data
(academic/
administrative/
general) A3322

UDARE
PROVIDE U-DARE Level-1
SERVICE function

User identity Accept user Control Provide services Maintenance


Authentication request/ provide operation and repair
A4 A5
A1 feed back A3
A2
A41 A42 A43…. A51 A52 A53…
A11 A12…A21 A22 A23
Level-2
function
Process request Search data Extract data
A31 A32 A33

A331 A332
A311 A312 Level-3
function
Connect to network A321 Search for data in
database A322
A3211 A3212 A3213…
Find the category of Collect data
infunction asked by A3122
user A3121

Lower-level A31211 A31212 A31213 A31221 A31222 A31223


function
PROVIDE U-DARE Level-1
SERVICE function

User identity Accept user Control Provide services Maintenance


Authentication request/ provide operation and repair
A4 A5
A1 feed back A3
A2
A41 A42 A43 …. A51 A52 A53 …
A11 A12 …A21 A22 A23
Level-2
function
Process request Search data Extract data
A31 A32 A33

A331 A332
A311 A312 Level-3
function
Connect to network A321 Search for data in
database A322
A3211 A3212 A3213 …
Find the category of Collect data
infunction asked by A3122
user A3121

Lower-level A31211 A31212 A31213 A31221 A31222 A31223


function
Common mistakes in Developing Functional
Architecture

• Including external systems and their


functions
• Choosing the wrong name for a function
• Creating a decomposition of a function that
is not a partition of that function
• Violating the law of conservation of inputs,
outputs, or controls
Finishing the Functional Architecture

• Defining System errors and the failure modes


and inserting functionality to detect the
errors and recover
• Inserting appropriate functionality for some
combination of built-in-self-test (BIST) and
external testability
Error detection Functions

Failure: Deviation in behavior between the system


and its requirements
Error : A subset of the system state, which may lead
to system failure.
Fault: a defect in the system that can cause an error.

Fault tolerance is the ability of a system to tolerate


faults and continue performing.
Fault tolerance terminology map
has
REQUIRMENTS
SYSTEM

may have
may have
has

DEFECT STATES
DEVIATION FROM
REQUIREMENT
may have
is-a
can cause
may lead to FAILURE
FAULT ERRORS

UNOBSERVABLE
OBSERVABLE
Fault tolerance can be achieved only for those
errors that are observed.

Functions associated with fault tolerance are:

Error detection
Damage confinement
Error recovery
Fault isolation and reporting
• Error detection is defining possible errors,
deviations in the subset of the system’s state
from the desired state, in the design phase before
they occur, and establishing a set of functions for
checking for the occurrence of each error.
– Type checks, range checks, timing checks

• Damage confinement is protecting the system from the


possible spread of failure to other parts of the system.
• Firewalls
• Error recovery attempts to correct the error after
the error has been detected and the errors extent
defined.
• Backward recovery, forward recovery

• Fault isolation and reporting attempts to determine


where in the system the fault occurred that
generated the error.
Functions for error detection, damage confinement,
error recovery, and fault isolation and reporting should
be included in the functional architecture.

These functions should be defined for each state


variable of the system.
Tracing Requirements to functional Architecture

All elements of the set of input/output requirements should be traced to


appropriate functions that have been defined in the functional decomposition

Input/Output Requirements( A Sample)


External
Functional Interface
Input Requirements Output Requirements Requirement Requirement
The elevator The elevator The elevator
Functions system shall
The elevator The Elevator The elevator
system shall system shall open system shall system shall use
receive calls for receive passenger system shall and close a phone line
up & down service provide control
activated fire automatically upon from the building
from all floors alarms in each adequate arrival at each elevator cars for emergency
of the building elevator car. illumination. selected floor. efficiently. calls.
0 Provide Elevator Services x x x x x x
1 Accept Passenger Requests + Provide Feedback x x x
1.1 Support Waiting Passengers x
1.2 Support Riding Passengers
1.3 Support Passengers in Emergency x x
2 Control Elevator Cars
3 Move Passengers between Floors x x
3.1 Receive + Discharge Passengers x
3.2 Travel to Next Stop
3.3 Provide Comfortable Atmosphere x
4 Enable Effective Maintenance and Servicing
Tracing Requirements to Functional Architecture
Input/OutputRequirements(ASample)
External
Functional Interface
InputRequirements OutputRequirements Requirement Requirement
Theelevator Theelevator Theelevator
Functions systemshall
Theelevator TheElevator Theelevator
systemshall systemshall open systemshall systemshall use
receivecallsfor receivepassenger systemshall andclose aphoneline
up&downservice activatedfire provide automaticallyupon control fromthebuilding
fromall floors alarmsineach adequate arrival ateach elevatorcars foremergency
ofthebuilding elevatorcar. illumination. selectedfloor. efficiently. calls.
0ProvideElevatorServices x x x x x x
1AcceptPassengerRequests+ProvideFeedback x x x
1.1SupportWaitingPassengers x
1.2SupportRidingPassengers
1.3SupportPassengersinEmergency x x
2Control ElevatorCars
3MovePassengersbetweenFloors x x
3.1Receive+DischargePassengers x
3.2Travel toNextStop
3.3ProvideComfortableAtmosphere x
4EnableEffectiveMaintenanceandServicing
Functional model review
Once a functional model is developed, it should be
reviewed by individuals that have substantial
knowledge of the system’s functioning
This review should :
• Try alternative decompositions
• Disaggregate the functions differently
• Reevaluate functional dominance in terms of
feedback and control
• Catch interface errors
Summary

• Need for functional modelling


• Procedure
• De-composition and composition
• Hately-Pirbhai Template
• IDEF0 modelling
• Evaluation- Scenario tracing
• Fault tolerance
• Requirement mapping

Das könnte Ihnen auch gefallen