Các tài liệu về phương pháp phát triển phần mềm hướng đối tượng tương đối nhiều, dài, ở mức trừu tượng cao và khó hiểu đặc biệt là đối với những người mới bắt đầu nghiên cứu về vấn đề này. Cái chúng ta thực sự cần ở thời điểm ban đầu đó là một thiết kế tối giản, chạy được để giúp cho chúng ta hình dung bức tranh tổng thể của hệ thống từ bước thiết kế đến lập trình sẽ như thế nào? tại sao lập trình viên chỉ cần nhìn vào bản thiết kế có thể code được.
Requirements Definition ■ CHAPTER 2 Domain Modeling
I magine if everyone on your team was talking a different language Let’s say you’re speaking
In a multilingual setting, misunderstandings often arise when teammates communicate in different languages, such as German, French, and Swahili Listeners may attempt to extract meaning from fragmented conversations, responding with nods that suggest comprehension However, this can lead to significant misinterpretations of the speaker's intended message, resulting in confusion and miscommunication among the team.
Miscommunication is a common issue in IT projects, often overlooked because team members assume they share the same understanding For instance, when one person mentions "book review," it can be interpreted in various ways; some may think it refers to an "editorial review" by the editorial team, while others may interpret it as a "customer review." This lack of clarity highlights the need for precise communication to ensure everyone is on the same page.
Customer reviews highlight that misinterpretations of requirements and design during system development can lead to disastrous outcomes.
The domain model is a live, collaborative artifact It is refined and updated throughout the project, so that it always reflects the current understanding of the problem space.
In this chapter we’ll look at domain modeling, which aims to solve the problem of miscommunication on projects by establishing a common vocabulary that maps out the problem space.
Domain modeling involves creating a comprehensive glossary of terms specific to your project, establishing the scope and serving as a foundational element for developing use cases It fosters a shared vocabulary, enhancing communication among project team members Although this book focuses on use case-driven development, it is essential to start with domain modeling.
A domain model serves as a dynamic dictionary for your project, encompassing all relevant terms Unlike a traditional project glossary, it visually represents the relationships between these terms through a simplified class diagram This diagram illustrates how different domain objects are interconnected, highlighting aggregation and generalization relationships, such as "has-a" and "is-a" connections among the domain classes.
Figure 2-1 illustrates a segment of a domain model, serving as a visual reference for the concepts we will explore throughout this chapter Focus on the overarching ideas rather than the specifics at this stage.
Why Start with the Domain Model Instead of Use Cases?
Creating a domain model at the beginning of a project can significantly enhance clarity and focus While writing use cases, it's easy to fall into the trap of making them overly abstract and vague However, some experts suggest that adopting this ambiguous approach may not be the best practice.
(only they call it “abstract,” “essential,” “technology-free,” etc.)—but more about that later
To effectively design your system, it's essential that your use case text is rooted in reality and closely aligned with the object model This means that the use cases should specifically reference domain objects by name By doing so, you can effectively connect the static and dynamic components of the model, which is vital for advancing your analysis and design efforts through your use cases.
Before crafting your use cases, it's essential to create an initial domain model, which serves as the basis for the static aspects of your system The domain model outlines the structure, while the use cases focus on the dynamic behavior, together forming a comprehensive framework for your project.
At the analysis level, "object" and "class" are often used interchangeably, as an object represents a runtime instance of a class However, at the design level, it is crucial to distinguish between objects and classes to enhance clarity and functionality in software development.
Figure 2-1 Example of a domain model diagram
This book is structured around a consistent format in each chapter, beginning with a theoretical exploration of modeling concepts illustrated through the Internet Bookstore example It then transitions to practical applications, highlighting common modeling errors and their corrections, accompanied by various exercises Each chapter concludes with additional practice opportunities to reinforce learning.
The principles discussed in this chapter can be summed up as a list of guidelines Our top 10 list follows.
10 Focus on real-world (problem domain) objects.
9 Use generalization (is-a) and aggregation (has-a) relationships to show how the objects relate to each other.
8 Limit your initial domain modeling efforts to a couple of hours.
7 Organize your classes around key abstractions in the problem domain.
6 Don’t mistake your domain model for a data model.
5 Don’t confuse an object (which represents a single instance) with a database table (which contains a collection of things).
4 Use the domain model as a project glossary.
3 Do your initial domain model before you write your use cases, to avoid name ambiguity.
2 Don’t expect your final class diagrams to precisely match your domain model, but there should be some resemblance between them.
1 Don’t put screens and other GUI-specific classes on your domain model.
Let’s look at each of these in more detail.
10 Focus on Real-World Objects
When developing a domain model, prioritize real-world entities relevant to the problem domain Structure your software architecture to reflect the realities of the physical world, as these elements generally exhibit more stability compared to the often-changing software requirements.
9 Use Generalization (Is-a) and Aggregation (Has-a) Relationships
As you develop your domain model, you'll continually add new domain classes upon identification, while also recognizing the relationships between them For instance, a Book Review is associated with a Book, and both a Purchase Order and a Credit Card represent different types of Payment Methods.
In the realm of data relationships, the first type is known as aggregation, exemplified by the connection between a Book and its Book Review, where a Book has a Book Review The second type is referred to as generalization, illustrated by the relationship between Purchase Orders and Credit Cards, both categorized as Payment Types, indicating that a Purchase Order is a form of Payment.
Type) Figure 2-3 shows an illustration of these concepts.
In Figure 2-2, two types of class notation are presented The detailed class diagram on the left includes attributes and operations, suitable for comprehensive analysis Conversely, during the early stages of domain modeling, it is more effective to utilize the simpler notation on the right, which solely displays the name of the domain class.
Figure 2-3 Aggregation and generalization relationships
Payment Type www.allitebooks.com
Analysis, Conceptual Design, and
To transition from use cases to detailed design and ultimately to code, it is essential to connect use cases to objects Robustness analysis serves as a valuable technique for bridging the gap between analysis and design by analyzing use case text to identify an initial set of objects for each use case These objects are categorized into boundary objects, entity objects, and controllers, which often function more like methods than traditional objects.
A robustness diagram visually represents a use case, ensuring that it aligns perfectly with the accompanying use case text This alignment compels you to connect the use case text to specific objects, facilitating the progression of object-oriented designs based on the use cases This process is the essence of robustness analysis, highlighting its transformative power in design development.
Creating a robustness diagram guarantees that the use case is framed within the context of the domain model, ensuring that all terms, including nouns and noun phrases, used in the domain model are also incorporated directly into the use case text.
Where Does Robustness Analysis Fit into the Process?
Robustness analysis occupies a crucial intermediary space between analysis and design, acting as a phase of preliminary design In this stage, you formulate initial assumptions regarding your design and begin to consider the technical architecture, as well as various potential design strategies Essentially, robustness analysis integrates elements of both analysis and design, bridging the gap between understanding the "what" and determining the "how."
It’s also an important technique to remove ambiguity from (disambiguate) your use case text.
Like Learning to Ride a Bicycle
Mastering robustness analysis is akin to learning to ride a bicycle; it may initially appear challenging, but once you grasp the concept, it becomes straightforward and easy to understand.
In this chapter, we will provide numerous examples to enhance your understanding of robustness diagrams Typically, it takes about six diagrams for the concept to truly click Keep in mind that a robustness diagram serves as a visual representation of a use case.
Mastering the creation of robustness diagrams can enable you to complete one in ten minutes or less for each use case The key to efficiency lies in accurately crafting your use case; if it takes longer than ten minutes to draw a robustness diagram, it's likely that you're investing too much time in revising the use case text.
Using a CASE tool can simplify your work, but creating robustness diagrams is quick and easy, allowing you to sketch them on paper or a whiteboard It's beneficial to draft your diagram on paper first, especially when you're new to the technique, before transferring it to a digital format.
Figure 5-1 Bridging the gap between “what” and “how”
A robustness diagram serves as a hybrid between class diagrams and activity diagrams, visually illustrating the behavior outlined in a use case It depicts both the participating classes and the software behavior without specifying which class is accountable for particular behaviors Each class is represented by a graphical stereotype icon, making the diagram resemble an activity diagram more than a traditional class diagram.
In a flowchart, the interaction between objects is depicted through lines connecting them, illustrating how one object communicates with another This visual representation effectively conveys the flow of action between the entities involved.
There’s a direct 1:1 correlation between the flow of action in the robustness diagram and the steps described in the use case text
The three class stereotypes shown in Figure 5-2 are as follows:
Boundary objects serve as the crucial interface between a system and its external environment, facilitating interaction through elements like screens or web pages These objects represent the presentation layer that users engage with, playing a vital role in bridging the gap between the system and its users.
• Entity objects: Classes from the domain model (see Chapter 2).
• Controllers: The “glue” between the boundary and entity objects.
It’s useful to think of boundary objects and entity objects as being nouns, and controllers as being verbs Keep the following rules in mind when drawing your robustness diagrams:
• Nouns can talk to verbs (and vice versa).
• Nouns can’t talk to other nouns.
• Verbs can talk to other verbs.
We’ll revisit these rules later in this chapter (see Figures 5-8 and 5-9).
■ Exercise Two of the following are legal constructs, but which two? a Boundary ➤Controller ➤Entity b Entity ➤Entity c Controller ➤Controller d Boundary ➤Boundary ➤Controller
Adhering to a noun-verb-noun structure in your use case text simplifies the process of creating robustness diagrams, making them easy to draw Conversely, if this pattern is not followed, you may find the diagrams challenging to construct.
If you struggle to create a basic robustness diagram from a use case, it may indicate challenges in developing a detailed design later Sequence diagrams utilize a noun-verb-noun structure, where objects represent the nouns and the messages exchanged are the verbs By organizing your text in this format early on, you simplify the process of creating a detailed design, making it more manageable and efficient.
Robustness analysis provides a sanity check for your use cases
In this section, we describe the theory behind robustness analysis, interspersed with exam- ples from the Internet Bookstore project We’ll begin with our top 10 robustness analysis guidelines
The principles discussed in this chapter can be summed up as a list of guidelines Our top 10 list follows.
10 Paste the use case text directly onto your robustness diagram.
9 Take your entity classes from the domain model, and add any that are missing.
8 Expect to rewrite (disambiguate) your use case while drawing the robustness diagram.
7 Make a boundary object for each screen, and name your screens unambiguously.
6 Remember that controllers are only occasionally real control objects; they are more typically logical software functions.
5 Don’t worry about the direction of the arrows on a robustness diagram.
4 It’s OK to drag a use case onto a robustness diagram if it’s invoked from the parent use case.
3 The robustness diagram represents a preliminary conceptual design of a use case, not a literal detailed design.
2 Boundary and entity classes on a robustness diagram will generally become object instances on a sequence diagram, while controllers will become messages.
1 Remember that a robustness diagram is an “object picture” of a use case, whose purpose is to force refinement of both use case text and the object model.
Let’s walk through the items in this list in more detail.
10 Paste the Use Case Text Directly onto Your Robustness Diagram
Creating a visual representation of the events in a use case reinforces your understanding of the object being depicted By drawing the diagram while referencing the text, you can effectively analyze the use case one sentence at a time, making it easier to comprehend the details.
Figure 5-3 presents an early-stage robustness diagram for the Internet Bookstore, specifically focusing on the Login use case At this point, the diagram only includes the initial sentences of the use case, illustrating the foundational elements of the system's functionality.
In Figure 5-3, the use case text has been pasted directly into a note on the diagram
Design and Coding ■ CHAPTER 8 Sequence Diagrams
After completing the robustness analysis and conducting a preliminary design review, you can initiate the detailed design phase At this point, your use case documentation should be thorough, accurate, and clear, providing a solid foundation for developing a comprehensive design.
The preceding steps have focused on preparing use cases for the detailed design phase After completing the robustness analysis and Preliminary Design Review (PDR), you should have identified most of the necessary domain classes At this point, it is also essential to finalize the technical architecture (TA).
Before we leap into the details of sequence diagramming, let’s take a step back (or up) and look at the bigger picture of object-oriented design (OOD).
Sequence Diagrams and Detailed OOD
Preliminary design focuses on discovering classes, also known as object discovery, while detailed design emphasizes behavior allocation, which involves assigning the identified software functions to the classes established during the preliminary design phase.
When you draw sequence diagrams, you’re taking another sweep through the prelimi- nary design, adding in detail.
In the preliminary design phase, you formulated initial ideas about the interactions between classes Now, it's essential to refine these concepts into a comprehensive and precise detailed design that aligns with the technical architecture (TA) you have established.
Sequence diagrams play a crucial role in driving detailed design, and it is essential to create them in a specific, minimal format outlined in this chapter Each use case is directly connected to its robustness diagram and corresponding sequence diagram, emphasizing the importance of maintaining one sequence diagram for each use case, just as you would with robustness diagrams.
Before we dive into the best practices for drawing sequence diagrams from your use cases, it helps to understand the stuff that a sequence diagram is composed of (see Figure 8-1).
The diagram illustrates the interaction between various objects, such as the Customer and Search Page, through the exchange of messages The vertical dotted lines, known as object life-lines, indicate the passage of time, starting with the initial message at the top of the diagram.
(Customercalling onSearch()on Search Page).
In the context of use cases, an actor represents the user engaging with the system, as illustrated in Figure 8-1 This interaction is further clarified by the system boundary diagram found in Figure 3-2.
You should recognize the boundary objectand entity objecticons from robustness diagram- ming in Chapter 5 (In Figure 8-1, the boundary objects are Search Pageand Search Results
Page; the entity object is Catalog.)
In sequence diagrams, controller objects are often absent, as the focus shifts to messages exchanged between boundary and entity objects While real controller classes, like "manager" or "dispatcher," may exist, it's essential to avoid cluttering your design with numerous small controller classes, which can be a temptation from certain frameworks.
In general, approximately 80% of the controllers derived from robustness diagrams can be effectively implemented through various operations on entity and boundary classes This key aspect of sequence diagramming will be discussed in more detail later.
The focus of controlrepresents the time that a particular method/function has control
It starts with the arrow going intothe function and finishes when the function returns.
Typically, a return arrow is unnecessary unless specific situations arise, such as indicating an asynchronous return value This is because parameters can effectively be passed back as arguments to the operation.
In the upcoming section, specifically item 5, it is recommended to turn off the focus of control, as it can distract you from your objectives during this phase of the process.
This section illustrates the use of sequence diagrams to enhance and detail object-oriented design for each use case, using examples from the Internet Bookstore project We will start with our top 10 guidelines to effectively implement this approach.
10 Understandwhyyou’re drawing a sequence diagram, to get the most out of it.
9 Draw a sequence diagram for every use case, with both basic and alternate courses on the same diagram.
8 Start your sequence diagram from the boundary classes, entity classes, actors, and use case text that result from robustness analysis.
7 Use the sequence diagram to show how the behavior of the use case (i.e., all the con- trollers from the robustness diagram) is accomplished by the objects.
6 Make sure your use case text maps to the messages being passed on the sequence diagram Try to line up the text and message arrows.
5 Don’t spend too much time worrying about focus of control.
4 Assign operations to classes while drawing messages Most visual modeling tools support this capability.
3 Review your class diagrams frequently while you’re assigning operations to classes, to make sure all the operations are on the appropriate classes.
2 Prefactoryour design on sequence diagrams before coding.
1 Clean up the static model before proceeding to the CDR.
Let’s look at each of these top 10 guidelines in more detail.
10 Understand Why You’re Drawing a Sequence Diagram
When creating sequence diagrams, it's essential to thoroughly examine the intricate details of each use case, including both the primary flow and all possible alternative actions This comprehensive analysis is crucial for a complete understanding of the system's design.
Identifying design issues early in the development process can significantly reduce the need for later refactoring, making it essential to thoroughly explore every aspect of each use case, rather than only focusing on ideal scenarios.
Sequence diagramming has three primary goals in ICONIX Process:
During robustness analysis, you identify classes that will later have behavior allocated to them In the sequence diagramming phase, the controllers identified in the robustness analysis are transformed into operations on these classes However, it's important to note that there isn't always a direct 1:1 correlation between controllers and operations; often, a single controller may evolve into multiple operations Additionally, there are instances where a controller could be converted into a controller class.
Domain Modeling Guidelines
The principles discussed in this chapter can be summed up as a list of guidelines Our top 10 list follows.
10 Focus on real-world (problem domain) objects.
9 Use generalization (is-a) and aggregation (has-a) relationships to show how the objects relate to each other.
8 Limit your initial domain modeling efforts to a couple of hours.
7 Organize your classes around key abstractions in the problem domain.
6 Don’t mistake your domain model for a data model.
5 Don’t confuse an object (which represents a single instance) with a database table (which contains a collection of things).
4 Use the domain model as a project glossary.
3 Do your initial domain model before you write your use cases, to avoid name ambiguity.
2 Don’t expect your final class diagrams to precisely match your domain model, but there should be some resemblance between them.
1 Don’t put screens and other GUI-specific classes on your domain model.
Let’s look at each of these in more detail.
10 Focus on Real-World Objects
When developing a domain model, it is essential to concentrate on tangible objects relevant to the problem domain Structuring your software architecture to reflect real-world scenarios can lead to greater stability, as real-world elements typically change less often than software requirements.
9 Use Generalization (Is-a) and Aggregation (Has-a) Relationships
As you develop your domain model, you'll gradually add new domain classes as they become evident, while also recognizing the relationships between them For instance, a Book Review is associated with a Book, and both a Purchase Order and a Credit Card are categorized as Payment Types.
The first relationship, known as aggregation, illustrates how a Book has a Book Review In contrast, the second relationship, termed generalization, demonstrates that a Purchase Order is a type of Payment, similar to a Credit Card.
Type) Figure 2-3 shows an illustration of these concepts.
In class diagrams, two types of notation are used: a detailed version that includes attributes and operations, and a simpler version that only displays the domain class's name While the detailed notation is suitable for comprehensive class diagrams, the simpler version is more appropriate during the initial stages of domain modeling when it's premature to define these components.
Figure 2-3 Aggregation and generalization relationships
Payment Type www.allitebooks.com
In your domain model, the primary relationships are plain associations, with aggregation and generalization accounting for 95% of class relationships.
■ Tip Wherever possible, place your associations so that they read left to right and top to bottom, just like regular text This will improve the readability of your diagrams.
8 Limit Your Initial Domain Modeling Efforts to a Couple of Hours
We recommend that you establish a time budget for building your initial domain model
In just a couple of hours, you can create a solid analysis-level class model, understanding that perfection is not the goal Focus on completing the task quickly and be prepared to make ongoing adjustments based on insights gained during robustness analysis and throughout the project.
As you explore use cases and robustness diagrams, you'll uncover missing elements within the domain model The use case-driven approach acknowledges the incompleteness of the domain model and offers a systematic way to identify overlooked aspects.
The initial domain modeling session is crucial, as it often reveals around 80% of your domain classes within just two hours By effectively clarifying your domain vocabulary during this brainstorming period, you can ensure that this time is well-invested in the project's success.
7 Organize Your Classes Around Key Abstractions in the Problem Domain
Organizing your classes around key abstractions in the problem domain is a best practice that strengthens your software architecture By creating a domain model as a foundational class diagram, you enhance the model's resilience to change This approach aligns the architecture with real-world abstractions, ensuring that it remains robust against frequently changing requirements, which tend to evolve more rapidly than the underlying real-world concepts.
6 Don’t Mistake Your Domain Model for a Data Model
While data models and class diagrams may appear similar, best practices for each differ significantly Class diagrams typically consist of smaller, focused units, whereas data models encompass larger tables that can represent multiple relationships For optimal design, classes should encapsulate concise packets of data and behavior, contrasting with the broader scope of relational database tables.
In a class diagram, a TableManager class often represents the management of a database table, aggregating a standard domain class The primary function of these TableManager classes is to abstract the complexities of the database management system (DBMS) from the rest of the application code.
5 Don’t Confuse an Object with a Database Table
An object signifies a unique instance, while a database table encompasses a collection of instances Unlike the strict interpretation found in Enterprise JavaBeans (EJB), where an entity bean corresponds to a single table row, domain classes offer a more flexible approach For instance, if you define a domain class as Book, it refers to an individual book rather than a book table.
In database design, columns in a table usually correspond to attributes of a class, but it's common for tables to have significantly more columns than the attributes present in a class This discrepancy often arises due to additional elements like foreign keys, leading to a situation where there isn't a straightforward 1:1 mapping between table rows and objects.
4 Use the Domain Model As a Project Glossary
If ambiguous requirements are the enemy, the domain model is the first line of defense.
Ambiguous usage of names by “subject matter experts” is very common and very harmful.
The domain model should serve as a project glossary that helps to ensure consistent usage of terms when describing the problem space.
Utilizing the domain model as a project glossary is essential for clarifying your model In Doug's Jumpstart workshops, he consistently identifies two to three domain classes with ambiguous naming, such as “shopping cart,” “shopping basket,” or “shopping trolley.”
3 Do Your Domain Model Before You Write Your Use Cases
To effectively clarify your problem domain abstractions, it's essential to utilize a well-defined domain model Avoid using ambiguous terminology in your use cases, as this can lead to confusion Therefore, invest time in refining your domain model for at least two hours before you begin drafting your use cases.
Writing the use cases without a domain model to bind everything together stores up lots of problems for later.
2 Don’t Expect Your Final Class Diagrams to Precisely Match Your Domain Model
Use Case Modeling Guidelines
The principles discussed in this chapter can be summed up as a list of guidelines These guidelines, in turn, can be summed up in a single sentence:
DESCRIBE SYSTEM USAGE IN THE CONTEXT OF THE OBJECT MODEL.
Items 10 through 5 of the following list relate to describing system usage, and items 4 through 1 relate to putting the usage description in the context of the object model.
10 Follow the two-paragraph rule.
9 Organize your use cases with actors and use case diagrams.
8 Write your use cases in active voice.
7 Write your use case using an event/response flow, describing both sides of the user/ system dialogue.
6 Use GUI prototypes and screen mock-ups.
5 Remember that your use case is really a runtime behavior specification.
4 Write the use case in the context of the object model.
3 Write your use cases using a noun-verb-noun sentence structure.
2 Reference domain classes by name.
1 Reference boundary classes (e.g., screens) by name.
Let’s look at each of these items in more detail.
10 Follow the Two-Paragraph Rule
Each use case should ideally be confined to two paragraphs, encompassing both the primary and alternative scenarios Exceeding this length can lead to complex and unclear sequence diagrams If a use case stretches beyond two paragraphs, it may be necessary to split it into multiple, distinct use cases for clarity.
Long use case templates can hinder software design progress, as they often contain excessive non-use-case information like functional requirements This can slow down the development process significantly, indicating that the person providing the template may not expect immediate action on the software design.
“Disintermangling Dysfunctional Requirements from the Scenario Text” in Chapter 13.)
When crafting use cases, writers should avoid lengthy lists of functional requirements Instead, focus on describing how users interact with the system and the system's corresponding actions This approach enhances clarity and ensures that the scenario remains user-centered.
HOW TO WRITE A USE CASE: THE THREE MAGIC QUESTIONS
Well, OK, this whole chapter describes how to write a use case But when writing use cases, you need to keep asking the following three fundamental questions: 1
(This gets your “sunny-day scenario” started.)
(Keep asking this question until your “sunny-day scenario” is complete.)
(Keep asking this one until you’ve identified all the “rainy-day scenarios” you can think of, and described the related behavior.)
1 For more about these “three magic questions,” see p 48 of Use Case Driven Object Modeling with
UML: A Practical Approachby Doug Rosenberg and Kendall Scott (Addison-Wesley, 1999).
9 Organize Your Use Cases with Actors and Use Case Diagrams
This seems like as good a time as any to stop for a moment and talk about use case diagrams and how they relate to use cases and actors.
A use case diagram provides a comprehensive overview by displaying multiple related use cases within a single visual representation Each use case is identified by its title, presented in oval shapes For instance, Figure 3-1 illustrates a typical use case diagram, highlighting the interconnectedness of various use cases.
In system diagrams, an actor is depicted as a stick figure, representing a "role" that users can assume While often referred to simply as "User ," actors are frequently assigned specific role names For instance, in the context of an Internet Bookstore system, actors may include roles such as Webmaster and Stock Manager.
Questions 1 and 2 focus on the basic course of a use case, often referred to as the sunny-day scenario, which outlines the ideal sequence of events when everything functions correctly In contrast, Question 3 addresses alternate courses, or rainy-day scenarios, detailing the outcomes when users deviate from the basic course These three questions are fundamental to understanding and writing effective use cases, and we will revisit them later in the chapter.
Figure 3-1 Example use case diagram
In the context of a system, the user, or actor, is an external entity, distinguishing themselves from the internal workings of the system Actors can include both individuals and nonhuman systems, leading to some confusion To clarify this concept, visual representations, such as a "robot stick figure" icon, can effectively illustrate the distinction between external actors and the internal system.
In a use case diagram, an association between an actor and a use case indicates that the actor is responsible for executing that use case For instance, when an Administrator is linked to the "Moderate Forum Messages" use case, it signifies that the Administrator is tasked with the responsibility of moderating messages within the forum.
A use case can involve multiple actors, indicating that it is linked to various roles Additionally, a single user can fulfill more than one actor role, such as being both a Stock Purchaser and a Shipping Clerk.
8 Write Your Use Cases in Active Voice
Understanding the difference between active and passive voice is essential for effective writing Active voice emphasizes the subject performing the action, while passive voice focuses on the action itself, often omitting the doer For instance, in passive voice, the emphasis is placed on the results rather than the agent responsible for the action.
The capability is provided for users to log in, using a password-protected authorization scheme.
While it may seem that the necessary capabilities are already in place, there is a possibility that you will need to develop them yourself Passive sentences can obscure the actors and software functions, making it difficult to understand the true meaning This lack of clarity often resembles functional requirements found in lengthy, passive specifications, which require you to rephrase them into active voice use cases to clarify the system's behavior for everyone involved.
To recognize passive sentences, look for the verb "to be" preceding another verb, typically in the past tense This structure indicates a passive construction, which can be effectively rewritten in active voice for clarity and engagement.
Passive sentences can confuse readers and lack engagement, leading to disinterest In contrast, active sentences clearly identify the subject and action, keeping readers engaged Writing from the user's perspective enhances clarity and sharpens use cases, reducing the risk of misinterpretation.
To log in, the user enters her username and password before clicking the Login button The system retrieves the user profile based on the username and verifies the password, successfully logging in the user.
This basic course outlines an ideal scenario where all processes function smoothly Additionally, an alternative course will address potential issues, such as the situation where the username or password cannot be located.
7 Write Your Use Case Using an Event/Response Flow
Requirements Review Guidelines
The advice given in this chapter is summed up in our top 10 requirements review guidelines.
Ensure that your domain model effectively represents at least 80% of the key abstractions from your problem domain, using clear, non-technical language that is easily understood by your end users.
9 Make sure your domain model shows the is-a (generalization) and has-a (aggregation) relationships between the domain objects.
8 Make sure your use cases describe both basic and alternate courses of action, in active voice.
7 Make sure that passive voice, functional requirements (i.e., “shall” statements), are not absorbed into and “intermangled” with the active voice use case text 2
6 Make sure you’ve organized your use cases into packages and that each package has at least one use case diagram.
5 Make sure your use cases are written in the context of the object model.
4 Make sure your use cases are written in the context of the user interface.
3 Make sure you’ve supplemented your use case descriptions with some sort of story- board, line drawing, screen mock-up, or GUI prototype.
2 Review the use cases, domain model, and screen mock-ups/GUI prototypes with end users, stakeholders, and marketing folks, in addition to more technical members of your staff.
1 Structure the review around our “eight easy steps to a better use case.”
Let’s walk through these top 10 items in more detail, and then we’ll illustrate them in practice by following a requirements review for the Internet Bookstore.
10 Make Sure Your Domain Model Covers the Problem Domain
Striving for perfection can lead to analysis paralysis, so it's essential to focus on progress rather than perfection when developing your domain model Aim to make iterative improvements rather than getting stuck in endless refinements.
• A domain model diagram that has the most important abstractions from the problem domain
2 In Chapter 13, we introduce the term “intermangled” to describe use case text that has had functional requirements text mangled into it.
3 General George S Patton, War as I Knew It(New York: Mariner Books, 1995), p 335 (referring to battle planning).
• All the boxes on this diagram have unambiguous names that the users of the system can relate to
• Getting this diagram done quickly!
Further details will be uncovered as you analyze the use cases.
9 Show Generalization and Aggregation Relationships
These generalization (is-a) and aggregation (has-a) relationships go a long way toward making the diagram concrete and specific as opposed to vague and ambiguous.
While a "link class" can be useful, particularly in complex many-to-many relationships within a data model, it is advisable to use this construct sparingly Most scenarios can be effectively managed using simpler relationships such as is-a and has-a.
Don’t split hairs (yet) between aggregation and composition, either—it’s too early to worry about this distinction.
8 Describe Both Basic and Alternate Courses of Action, in Active Voice
Use cases illustrate how users interact with the system, employing present tense and active voice They encompass both typical scenarios, often referred to as "sunny day" usage, and less common situations, known as "rainy day" usage.
While you may already be aware, we've observed that many of your peers, despite their theoretical knowledge, often fail to implement it effectively in practice Therefore, we're reiterating this important point, and we may emphasize it a few more times for clarity.
7 Don’t Mix Functional Requirements into Your Use Case Text
Functional requirements are typically expressed in passive voice using "shall" statements, such as "The system shall do this." A frequent error is incorporating these requirements into use case descriptions Instead, functional requirements should be maintained separately and allocated to the relevant use cases While use cases are designed to satisfy functional requirements, they should not include the passive voice "shall" statements It is essential to keep use cases centered on system usage, utilizing active voice for clarity and effectiveness.
In Chapter 13, we’ll show you how easy it is to allocate requirements to use cases It’s just a single drag and drop if you do it correctly.
6 Organize Your Use Cases into Packages
To effectively organize your use case model, consider structuring it by functionally related subsystems, by release, or a combination of both A practical approach is to identify all use cases within a functional area on the use case diagram while providing narrative descriptions exclusively for those use cases included in the current release.
■ Tip It’s useful to use color-coding on the use case diagram to show which use cases will be implemented in the current release.
Don't focus excessively on perfecting your use case diagram with stereotypes, as striving for perfection can hinder progress Instead, view the use case diagram as a clear visual table of contents for your project While it should be easy to understand, the essential elements of the use case model lie in the detailed text of the use cases and the accompanying robustness and sequence diagrams for each use case.
5 Write Your Use Cases in the Context of the Object Model
The most effective approach to developing use cases is to first create a domain model, ensuring that the use cases explicitly reference the domain objects by name This strategy enhances clarity and alignment between the use cases and the underlying domain model.
Ambiguity in use cases often stems from their reliance on “user terms” without clearly identifying the specific “problem domain elements” involved To clarify your use case, the initial step is to explicitly reference the relevant domain objects within the text.
4 Put Your Use Cases in the Context of the User Interface
To base your use cases on the user interface, name the screens that will participate in the use case, and use those names in the use case text.
To enhance clarity and coherence in use cases, it is essential to connect both the object model and the GUI model with the narrative behavior descriptions This entails explicitly naming your screens and incorporating those names throughout the use case text.
Although some theories suggest separating use cases from the user interface, our experience shows that this approach often results in ambiguity It's essential to name your screens, as doing so clarifies their purpose and makes the development process smoother Naming your screens will ultimately benefit your project.
■ Tip Name your screens, and use those names in your use case descriptions.
3 Use Storyboards, Line Drawings, Screen Mock-ups, or GUI Prototypes
Make sure all of the user’s behavior (e.g., buttons they can click, menus they can pick from) is accounted for in the use cases.
After naming your screen, it's essential to create a storyboard or mock-up to visualize user interactions with the system This is crucial because elements like the Cancel button can significantly impact system behavior, such as rolling back to a previous transaction Without a visual aid to outline the screen's components, you risk overlooking important actions, like the "On Click Cancel" behavior in your use case documentation Ensuring these details are captured is vital for a seamless user experience.
Mock-ups should prioritize simplicity and clarity over high-fidelity details, focusing on illustrating user-triggered system behaviors Quick creation is essential to ensure you follow this advice and avoid skipping the drawing process altogether.
■ Tip Don’t be afraid to build some exploratory prototypes to help validate your requirements.
To enhance your understanding of required behaviors, review your exploratory prototypes alongside the use cases In some instances, a storyboard may fall short, making it beneficial to connect several screens for a more comprehensive presentation to your users Feel free to proceed with this approach if necessary.
2 Review the Behavioral Requirements with the Right People
Robustness Analysis Guidelines
The principles discussed in this chapter can be summed up as a list of guidelines Our top 10 list follows.
10 Paste the use case text directly onto your robustness diagram.
9 Take your entity classes from the domain model, and add any that are missing.
8 Expect to rewrite (disambiguate) your use case while drawing the robustness diagram.
7 Make a boundary object for each screen, and name your screens unambiguously.
6 Remember that controllers are only occasionally real control objects; they are more typically logical software functions.
5 Don’t worry about the direction of the arrows on a robustness diagram.
4 It’s OK to drag a use case onto a robustness diagram if it’s invoked from the parent use case.
3 The robustness diagram represents a preliminary conceptual design of a use case, not a literal detailed design.
2 Boundary and entity classes on a robustness diagram will generally become object instances on a sequence diagram, while controllers will become messages.
1 Remember that a robustness diagram is an “object picture” of a use case, whose purpose is to force refinement of both use case text and the object model.
Let’s walk through the items in this list in more detail.
10 Paste the Use Case Text Directly onto Your Robustness Diagram
Incorporating a diagram while analyzing a use case enhances your understanding by visually representing the events described This approach allows you to break down the use case sentence by sentence, making it convenient to reference the accompanying text as you create the diagram.
Figure 5-3 illustrates an early-stage robustness diagram for the Login use case of the Internet Bookstore This snapshot captures the initial development of the diagram, showcasing only the first few sentences of the use case.
In Figure 5-3, the use case text has been pasted directly into a note on the diagram
The robustness diagram serves as a visual representation of the use case, making it beneficial to include text directly on the diagram This integration allows users to navigate through the written content while simultaneously tracing it on the diagram, providing a cohesive understanding of both perspectives.
Utilizing a CASE tool like EA allows for the creation of a dynamic connection between use cases and notes on robustness diagrams, ensuring that any updates made to the use case automatically reflect in the corresponding diagram notes.
Before examining the completed diagram in Figure 5-5, attempt to fill in the diagram yourself, using the controllers and message arrows from Figure 5-3 as a guide Focus on translating the use case text into a visual format without delving into design specifics Keep in mind that this is a preliminary design exercise aimed at validating your comprehension of the use case rather than a full object-oriented design.
At this stage, we've just begun exploring the fundamental concepts, so it's natural to encounter some errors However, stay positive; the goal is to experiment and reflect on the diagram you created as you continue reading the upcoming sections.
9 Take Your Entity Classes from the Domain Model, and Add Any That Are Missing
Many entities in your robustness diagram will stem from your domain model However, since your initial domain modeling was limited to a few hours, it's likely that some domain classes may be overlooked When creating robustness diagrams, ensure that you incorporate any missing classes into the domain model for a comprehensive representation.
The ICONIX Process recognizes that your initial domain model may be incomplete and anticipates the identification of missing objects through robustness analysis This approach is referred to as object discovery in this book.
Figure 5-3 Partially completed robustness diagram with the use case text pasted in
The user clicks the login link from any of a number of pages; the system displays the login page.
The user enters their username and password and clicks Submit.
The system verifies the existence of the user account in the master account list and subsequently checks the password Upon successful authentication, it retrieves the account information, initiates a secure session, and redirects the user to the previous page with a welcoming message.
User forgot the password: The user clicks the What's my
Password? link The system prompts the user for their username if not already entered, retrieves the account info, and emails the user their password.
Invalid account: The system displays a message saying that the "username or password" was invalid, and prompts them to reenter it.
Invalid password: The system displays a message that the
"username or password" was invalid, and prompts them to reenter it.
User cancels login: The system redisplays the previous page.
Third login failure: The system locks the user's account, so the user must contact Customer
Does account exist?click submit
8 Expect to Rewrite Your Use Case While Drawing the Robustness Diagram
First-draft use cases often display characteristics such as vagueness, ambiguity, incompleteness, and inaccuracies, which can hinder project success This highlights the necessity for a disambiguation technique, such as robustness analysis, to clarify and refine use cases One of the main goals of this technique is to eliminate ambiguity, ensuring that use cases are clear and precise.
The “magic” of this technique is in reality hard work: drawing a robustness diagram forces you to work through the use case one sentence at a time This simple act almost
TYING YOUR USE CASE TO THE DESIGN
The robustness diagram ties three elements to your use case: the GUI, the domain classes, and an intended list of software functions (see Figure 5-4).
The behavior requirements outlined in your use case must address various aspects of the system, focusing on user interactions with the GUI and the manipulation of core domain objects The software functions operate in the space between the GUI and these domain objects, playing a crucial role in facilitating these interactions.
Robustness diagrams are used to represent graphical user interface (GUI) elements as boundary objects, software functions as controllers, and domain objects as entities It is important to distinguish robustness diagrams from collaboration diagrams, as the latter solely focus on illustrating object interactions without depicting the structural elements of the system.
Robustness diagrams are essential for enhancing your use case by linking three key elements, which helps identify errors in the initial draft Therefore, it is crucial to revise the use case concurrently with the creation of the robustness diagram to ensure clarity and accuracy.
7 Make a Boundary Object for Each Screen
Creating a robustness diagram promotes clear and precise naming of boundary objects, ensuring disambiguated nomenclature If you encounter a boundary object labeled as “web page” on the diagram, take a moment to identify its actual name and use that instead.
6 Remember that Controllers Are Typically Logical Software Functions
In design, while control-intensive classes like manager classes can be represented as controllers, not every controller on a robustness diagram corresponds to an actual control class; often, they serve merely as placeholders for software functions Excessive reliance on controller classes, such as assigning one controller per use case, risks reverting to functional decomposition, so their use should be limited Additionally, robustness diagrams differ significantly from collaboration diagrams by incorporating a blend of objects and functions.
PDR Guidelines
The principles discussed in this chapter can be summed up as a list of guidelines Our top 10 list follows.
10 For each use case, make sure the use case text matches the robustness diagram, using the highlighter test.
9 Make sure that all the entities on all robustness diagrams appear within the updated domain model.
8 Make sure that you can trace data flow between entity classes and screens.
7 Don’t forget the alternate courses, and don’t forget to write behavior for each of them when you find them.
6 Make sure each use case covers both sides of the dialogue between user and system.
5 Make sure you haven’t violated the syntax rules for robustness analysis.
4 Make sure that this review includes both nontechnical(customer, marketing team, etc.) and technical folks(programmers).
3 Make sure your use cases are in the context of the object model and in the context of the GUI.
Ensure that your robustness diagrams and associated use case text maintain a higher-level overview and do not delve into the same level of detail as sequence diagrams Avoid attempting detailed design at this stage.
1 Follow our “six easy steps” to a better preliminary design (see Chapter 6).
Let’s look at each of these top 10 items in more detail.
10 Use the Highlighter Test to Match the Use Case Text with the Diagram
It is a common misconception that robustness diagrams should only depict the basic course of action or that separate diagrams are needed for each alternate course However, the most effective approach is to illustrate the entire use case, including both the basic and all alternate scenarios, within a single robustness diagram.
If the diagram becomes too big (or if you find that the alternates have their own subalter- nates), consider splitting up the use case.
■ Tip Many people like to use a different color for the alternatesto make the diagram easier to follow.
A 59-cent highlighter is an essential tool for ensuring that your use case text aligns with your robustness diagram By highlighting each sentence of your use case alongside the corresponding section of the diagram, you can effectively verify consistency throughout the entire document This method allows for a clear visual representation, as the entire robustness diagram will also be highlighted, confirming the accuracy of your work.
If you find a mismatch between the text and the diagram (and trust us, you will), then you have more work to do.
9 Make Sure That All the Entities Appear Within the Updated Domain Model
Object discovery is a key aspect of robustness analysis, and it is essential to integrate newly identified objects from our robustness diagrams back into the evolving class model derived from the domain model.
To ensure that new classes are not overlooked in the class model, it is essential to incorporate them directly into the model, categorize them as entities, and subsequently include them in the robustness diagram.
8 Make Sure That You Can Trace Data Flow Between Entity Classes and Screens
In your application, users typically input information through the system's screens, and this data must be transferred into entity classes that store these values as attributes Conversely, the values from these entity classes are also presented back on the screens for user interaction.
Before you start coding, it's essential to identify the necessary attributes for each class As you map the data flow between screens and entity classes, ensure that you fill in any missing attributes in the class model to maintain coherence and functionality.
7 Don’t Forget the Alternate Courses, and Don’t Forget to Specify Their Behavior
Neglecting to consider alternative courses of action, often referred to as "Whoops, it crashed!", is a critical failure point in software development that we cannot stress enough.
■ Note Alternate courses are not necessarily error paths but can include infrequent/atypical usage paths.
When documenting alternate courses in a use case, it is essential to thoroughly describe the system's behavior in response to the triggering conditions While recognizing the possibility of an alternate course is important, it is not enough to fulfill the use case requirements It is crucial to provide a detailed account of both user and system interactions to effectively illustrate how each alternate course is managed.
Alternate courses represent over half of a software's complexity, making it crucial to define their behavior Failing to do so can result in classes lacking essential operations for managing these alternate paths.
6 Make Sure Each Use Case Covers Both Sides of the User/System Dialogue
A frequent mistake made by beginners in writing use cases is merely listing all the steps a user takes and mistakenly believing they have completed the task, often finishing quicker than their peers in training.
This flawed approach overlooks a crucial aspect: the primary objective is to thoroughly comprehend and define the software behavior of the system Focusing solely on user actions while neglecting system behavior significantly hinders progress in accurately specifying software functionality.
■ Tip Always keep in mind that a use case is a dialogue between the user(s) and system, and you need to write about both sides of that dialogue.
5 Make Sure You Haven’t Violated the Syntax Rules for Robustness Analysis
Refer back to Figures 5-8 and 5-9 for the full rules of robustness analysis In particular, during the review make sure that
• Actors are only linked to boundary objects.
In a system, direct communication between boundary and entity objects, as well as between boundaries and between entities, cannot occur without the presence of controllers Controllers are essential as they embody the system's behavior, making their inclusion crucial for effective communication and functionality within the system.
While the syntax rules for robustness analysis may appear challenging, refining your use case's initial design to align with these guidelines is crucial for a successful detailed design phase Ensuring this step is done correctly will make the coding process much smoother.
If a use case is difficult to convert into a valid robustness diagram, it will likely be even more challenging to develop a working design and maintainable code The robustness diagram serves as an early warning signal, indicating that the use case text may require further refinement due to vagueness, ambiguity, or incompleteness.
As you saw in Chapter 5, automated tools support for ICONIX Process is continuing to improve Validating the robustness diagram syntax rules is now as easy as pulling down a menu.
■ Tip As you’ll see later, you can automatically generate unit test stubs for each controller as well.
4 Include Both Nontechnical and Technical People in the Review
Technical Architecture Guidelines
The principles discussed in this chapter can be summed up as a list of guidelines Our top 10 list follows.
Architectures generally cover three broad areas:
• The deployment model (network and application servers, and how they fit together; system topology; web browsers supported; etc.)
• The package/component model (separation of concerns to different strata/ components)
9 Understand why you’re creating an architecture
Before you even think about the system’s architecture, it’s important to understand precisely why an architecture is even needed.
8 Base the architecture objectively on the requirements
When designing architecture, it's crucial to prioritize project requirements over the latest technology trends to make informed decisions Budget considerations play a significant role; even if a top-tier application server like "BankBreaker 8.0 Service Pack 12" is deemed technically superior, it’s essential to evaluate if the budget can accommodate it Exploring more cost-effective and robust alternatives that fulfill the project’s needs can lead to better overall outcomes.
7 Consider factors such as scalability, security, and availability.
5 Pose hard questions to all the people involved.
Questions regarding such issues as security, auditing, portability, and scalability need to be answered now, not six months into the project.
4 If you don’t get the answers you need, ask again—and keep on asking!
In Agile Development with the ICONIX Process, co-author Mark Collins-Cope shared insights on a trading system he was developing, which required orders to time out after 1 to 30 days To facilitate testing without the need for prolonged waiting, the team implemented a feature that allowed the user interface to set the date and time specifically for testing purposes This highlights the importance of incorporating testing considerations during the early architectural planning stages of development.
2 Explore which external systems you’ll need to interface with.
Scour the requirements for anything relating to synchronous or asynchronous external system interaction For synchronous systems, think about external system availability.
Is it a requirement that your system be able to operate without the other system?
1 Have the courage to believe that your architecture is right and the strength to push its adoption throughout the project.
Building software is a complex endeavor that can easily result in disorganized outcomes rather than a polished final product To avoid this, it is essential for all team members to collaborate towards a unified vision instead of pursuing individual "micro-projects" with differing goals and standards The chief architect plays a crucial role in this process by effectively communicating the documented architecture to ensure that everyone comprehends it, not just at the project's outset but continuously throughout its development.
■ Note Our thanks to Mark Collins-Cope, our co-author on Agile Development with ICONIX Process (Apress,
2005), for providing most of this section’s content.
Architectural layering serves as a visual metaphor that organizes the software components of a system into distinct bands or layers within an architectural diagram Various diagrams have been utilized to illustrate this concept, and we will present two examples to introduce the idea effectively.
Figure 7-1 presents a view of a strictly layered architecture
Figure 7-2 shows a type of ad hoc architecture diagram that is not uncommon in modern technical documentation
Some common themes run through these diagrams:
• It’s possible to identify a number of layers in the construction of pieces of software.
• Some layers sit on top of others (although there may be some question as to what one layer being above another actually means).
• We may broadly categorize layers as being either horizontal (applicable across many, if not all, business domains) or vertical (applicable across a subset or only one domain).
Client Program Network Layer SQL Layer DBMS Layer
Figure 7-2 Typical ad hoc architectural layering diagram
Business Objects Application Framework Platform
UML class diagrams conventionally position subclasses, which are more specialized, beneath their general-purpose parent classes, creating a visual metaphor that contrasts with the architectural convention of placing the most specific elements at the top This discrepancy can lead to confusion and is explored in greater detail in the article "The Topsy Turvy World of UML."
This section presents a case study for an Internet Bookstore project utilizing the Spring Framework, providing an opportunity to introduce essential Spring concepts These concepts will be explored in greater detail in subsequent chapters, specifically during the detailed design phase (Chapter 8), the Critical Design Review (CDR) (Chapter 9), and the coding process (Chapter 10).
A critical design decision during Technical Architecture (TA) is selecting the appropriate web framework and programming language for web-based systems This choice should not be assumed, as it may have been predetermined by management or sales teams prior to the involvement of software designers Ideally, this decision should be driven by the technical requirements identified during the design process, emphasizing the importance of aligning design decisions with project needs.
Figure 7-3 Class diagrams and architectural views
1 Hubert Matthews and Mark Collins-Cope, “The Topsy Turvy World of UML,” ObjectiveViewIssue 4,available at www.softwarereality.com/ObjectiveView.jsp, 2000.
In this article, we will design a web-based system for an Internet Bookstore using Java and the Spring Framework, a lightweight J2EE container Specifically, we will focus on Spring Web MVC, which facilitates the creation of web applications through the Model-View-Controller (MVC) architecture For the front-end, or "View" component of the MVC, we will utilize JavaServer Pages (JSP) enhanced with Sun's standard JSP Tag.
Library (JSTL) 4 For the back-end data store connected to our model, we’ll use Spring’s JDBC support to implement our Data Access Objects (DAOs).
Because this is a “quick ’n easy” demo application, we’ll use HSQL 5 for the database.
HSQL is a “personal” database, not suited for large-scale multiuser web applications, but it’s certainly well suited for quick and painless prototype development work.
■ Tip HSQL includes an in-memory persistence mode, which (because it doesn’t access the hard disk) is very fast and ideal for unit testing.
We’ll also show how to use EA to generate Spring-ready Java code from the domain objects and controllers in our UML model.
Familiarity with the Spring Framework can enhance your understanding of the Internet Bookstore example, but it is not a prerequisite One of Spring's key features is its support for Plain Old Java Objects (POJOs), which are independent of the container framework POJOs are essentially standard JavaBeans equipped with typical “getters and setters.” In Chapter 9, we demonstrate how to generate these POJOs directly from your static model Additionally, Spring allows for the configuration of dependencies between JavaBeans by wiring them together using straightforward XML files.
This article will cover essential aspects of the Spring Framework, revisiting it in detail during the design phase in Chapter 9 and the programming phase in Chapter 10 The upcoming section will introduce the fundamental concepts that form the foundation of Spring.
To follow along with the Internet Bookstore example, it isn’t essential for you to know how
This section elucidates the rationale behind our design and coding choices, particularly in the context of Spring While this book primarily focuses on other topics, it provides valuable insights into Spring's role in developing web applications, specifically through the use of JSP, JSTL, and JDBC.
3 See http://java.sun.com/products/jsp.
4 See http://java.sun.com/products/jsp/jstl.
5 See http://hsqldb.sourceforge.net.
What Exactly Is Spring Framework?
The Spring Framework is widely recognized as a lightweight application framework for J2EE, but its capabilities extend beyond this realm It includes a sub-project known as Spring Rich Client, which leverages its sophisticated design to develop Java Swing client-side applications Nonetheless, the primary usage of Spring remains on the server side.
The definition is further complicated because Spring allows different frameworks to be
“plugged in” to handle object-relational mapping (ORM), views/templating, and so forth.
Content solutions involving JSP, Velocity, and Struts provide a flexible framework for web application development Struts supports various view technologies, including JSP and Velocity templates, allowing developers to create dynamic web pages and manage application flow effectively Spring framework offers robust support for Object-Relational Mapping (ORM) technologies such as JDBC, Hibernate, Java Data Objects (JDO), and iBATIS Additionally, it provides a variety of templating and web content solutions, including JSP, Velocity, and Struts, enhancing the development of dynamic web applications.**Source:**1 java - Struts2 - How can I get the result of a JSP page as a string in : https://stackoverflow.com/questions/25936387/struts2-how-can-i-get-the-result-of-a-jsp-page-as-a-string-in-an-action-class2 [PDF] Struts 2 in Action - Computer Science: Indiana University: https://cs.indiana.edu/~dgerman/08092011.pdf3 Result Types - Apache Struts: https://struts.apache.org/core-developers/result-types4 [PDF] Practical Apache Struts2 Web 2.0 Projects: http://ndl.ethernet.edu.et/bitstream/123456789/63182/1/41.pdf5 CVE-2017-5638: The Apache Struts Vulnerability Explained: https://www.blackduck.com/blog/cve-2017-5638-apache-struts-vulnerability-explained.html6 [PDF] Web Application Architecture: Principles, Protocols and Practices: http://ndl.ethernet.edu.et/bitstream/123456789/34979/1/9.pdf7 Struts forward/redirect via POST what am I missing? - Oracle Forums: https://forums.oracle.com/ords/apexds/post/struts-forward-redirect-via-post-what-am-i-missing-98848 [PDF] INSTRUCTIONS - Illinois.gov: http://apps1.dot.illinois.gov/eplan/desenv/080312/60I22-064/60I22-064.pdf9 VelocityResult (Struts 2 Core 2.5.20 API) - javadoc.io: https://javadoc.io/static/org.apache.struts/struts2-core/2.5.20/org/apache/struts2/result/VelocityResult.html10 Struts 2 Tutorial 04 Part 1 - Writing a Struts 2 Application - YouTube: https://www.youtube.com/watch?v=u4Pn1rdv5Is
Spring's JDBC support offers exceptional control over object persistence and retrieval from the database, significantly reducing the repetitive boilerplate code typically associated with JDBC-based applications.
To leverage Spring's J2EE capabilities, it is essential to deploy it within a J2EE server Specifically, for utilizing its web MVC features, a Java servlet/JSP container like Tomcat or Resin is required In this case, we will be using Tomcat for the Internet Bookstore application.
Technical Architecture Errors (the “Don’ts”)
This list highlights common mistakes observed in real projects, serving as a counterpoint to the top 10 "do's" discussed earlier in this chapter.
10 Picking an architecture without considering the cost of the hardware or new hardware.
9 Using the old legacy architecture because “that’s the way it’s always been done.”
When planning a system, it's crucial to consider the number of users that will be active simultaneously and identify peak usage periods Additionally, understanding the required transaction rate per minute is essential, as these factors significantly impact the technical architecture and overall project success Addressing these questions early in the planning process is vital for effective system design.
Security encompasses the authentication and authorization of users within a system Frequently, security measures are added late in the development process, leading to a system that is fraught with vulnerabilities.
AOP offers a solution for integrating security into projects that may not have prioritized it initially, but achieving optimal security from the start remains the most effective approach Security should be embedded throughout the system, much like the consistent pattern in Brighton rock, ensuring that your product is thoroughly protected and resilient against vulnerabilities.
6 Picking a new technology (language, platform, framework) because that’s the way the market is heading, and not really knowing about the technology.
“We must use this technology because everyone in the papers is talking about it!”
In particular, XML-HELL comes to mind Commonly, this TA error means picking an architecture that uses a platform you and your team have no prior experience with
Fashionable new technology is, by definition, innovative However, an effective architect must possess extensive knowledge and prior experience with the technology they are assessing and integrating into their designs.
5 Failing to formulate the TA objectively based on the project’s requirements.
4 Spending too long on the architecture before delving into design.
Architectural paralysis can be just as detrimental to a project as analysis paralysis, often leading to significant delays Given the critical role architecture plays, teams may find themselves spending six months or more deliberating over design choices However, it’s crucial to remember that, alongside these discussions, there is a system that needs to be developed and implemented.
9 See http://en.wikipedia.org/wiki/Rock_(confectionery).
10 The article “Software Fashion” equates designers who automatically buy into the latest technology with “fashion victims”: www.softwarereality.com/soapbox/softwarefashion.jsp
3 Forgetting to think about how the system will be tested.
2 Defining the TA before understanding what the users need to do.
1 Failing to do an architecture at all.
In this chapter, we explored the concept of technical architecture (TA) beyond the surface level, focusing on the Spring Framework We outlined how we will implement this framework in the context of developing the Internet Bookstore, providing a foundational understanding for its application.
The scope of Technical Architecture (TA) differs significantly across various projects and organizations While it is not the primary emphasis of the ICONIX Process, we have provided a brief overview of the topic in this chapter.
Figure 7-11 shows where TA sits in the preliminary design stage of the process.
In the next chapter, we look at detailed design and flesh out the Internet Bookstore using sequence diagrams.
Figure 7-11 Technical architecture and the preliminary design stage
After completing the robustness analysis and conducting a preliminary design review, you can now initiate the detailed design phase At this stage, your use case documentation must be thorough, accurate, and explicit, providing a solid foundation for developing a comprehensive design.
The previous steps have laid the groundwork for the detailed design phase by preparing the use cases After completing the robustness analysis and the Preliminary Design Review (PDR), you should have identified most of the necessary domain classes Additionally, it's essential to finalize the technical architecture (TA) at this point.
Before we leap into the details of sequence diagramming, let’s take a step back (or up) and look at the bigger picture of object-oriented design (OOD).
Sequence Diagrams and Detailed OOD
Preliminary design focuses on discovering classes, also known as object discovery, while detailed design is centered on behavior allocation, which involves assigning the identified software functions to the classes established during the preliminary design phase.
When you draw sequence diagrams, you’re taking another sweep through the prelimi- nary design, adding in detail.
In the preliminary design phase, initial assumptions about class interactions were established Now, it is essential to refine these concepts into a precise and detailed design that aligns with the defined technical architecture (TA).
Sequence diagrams play a crucial role in the detailed design process, and it's important to create them in a specific, minimal format as outlined in this chapter Each use case is directly connected to its corresponding robustness diagram and sequence diagram Just like you create one robustness diagram for each use case, you should also develop a single sequence diagram for every use case to maintain clarity and coherence in your design.
Before we dive into the best practices for drawing sequence diagrams from your use cases, it helps to understand the stuff that a sequence diagram is composed of (see Figure 8-1).
The diagram illustrates the interaction between various entities, such as the Customer and the Search Page, as they exchange messages The vertical dotted lines signify the passage of time, indicating that the process initiated with the topmost message unfolds over a sequence of events.
(Customercalling onSearch()on Search Page).
In the context of the use cases outlined, the actor represents the user engaging with the system, as illustrated in Figure 8-1 For a clearer understanding, refer to the "system boundary" diagram provided in Figure 3-2.
You should recognize the boundary objectand entity objecticons from robustness diagram- ming in Chapter 5 (In Figure 8-1, the boundary objects are Search Pageand Search Results
Page; the entity object is Catalog.)
Sequence Diagramming Guidelines
10 Understandwhyyou’re drawing a sequence diagram, to get the most out of it.
9 Draw a sequence diagram for every use case, with both basic and alternate courses on the same diagram.
8 Start your sequence diagram from the boundary classes, entity classes, actors, and use case text that result from robustness analysis.
7 Use the sequence diagram to show how the behavior of the use case (i.e., all the con- trollers from the robustness diagram) is accomplished by the objects.
6 Make sure your use case text maps to the messages being passed on the sequence diagram Try to line up the text and message arrows.
5 Don’t spend too much time worrying about focus of control.
4 Assign operations to classes while drawing messages Most visual modeling tools support this capability.
3 Review your class diagrams frequently while you’re assigning operations to classes, to make sure all the operations are on the appropriate classes.
2 Prefactoryour design on sequence diagrams before coding.
1 Clean up the static model before proceeding to the CDR.
Let’s look at each of these top 10 guidelines in more detail.
10 Understand Why You’re Drawing a Sequence Diagram
When creating sequence diagrams, it's essential to thoroughly analyze the intricate design of each use case, focusing on both the primary flow and all alternative actions This comprehensive exploration is crucial for a complete understanding of the system's functionality.
Identifying design issues early in the process can significantly reduce the need for extensive refactoring later on Therefore, it's essential to thoroughly design and evaluate every aspect of each use case, rather than focusing solely on ideal scenarios.
Sequence diagramming has three primary goals in ICONIX Process:
During robustness analysis, you identify classes that will later have behavior allocated to them In sequence diagramming, the controllers identified in this analysis are translated into operations on these classes However, it's important to note that there isn't always a direct 1:1 correlation between controllers and operations; frequently, a single controller may be represented by multiple operations Additionally, there are instances where a controller may evolve into a controller class.
When creating sequence diagrams, it is essential to illustrate the interactions between classes throughout the lifecycle of a use case This process involves analyzing how the system will execute the behaviors outlined in your use cases By focusing on the runtime instances of your classes, you can effectively depict the dynamic interactions between these objects, showcasing how they collaborate to achieve the desired functionality.
To effectively finalize the distribution of operations among classes, it is essential to conduct a two-pass design approach In the preliminary design phase, focus on identifying attributes while intentionally setting aside operational considerations This initial phase helps establish a solid foundation of data, revealing at least three-quarters of the necessary attributes Once you transition to the detailed design stage, you can allocate operations accurately, as you now possess the complete information needed to determine the behavior of each class.
In object-oriented programming, objects communicate by sending messages to one another, with Ruby treating all interactions as literal messages Conversely, languages like Java and C++ interpret these messages in sequence diagrams as method or function calls Additionally, in UML, once a message is associated with a class, it is referred to as an operation.
Messages, methods, functions, operations, verbs, and controllers all represent various aspects of the same concept: the behaviors assigned to a class through sequence diagramming, which are subsequently implemented and tested.
9 Do a Sequence Diagram for Every Use Case
It’s pretty simple to make sure you’ve covered everything in your design, if you stick to these two simple rules:
• Write a use case for every scenario you’re going to build in your current release (include basic and alternate courses in each use case).
• Draw a sequence diagram for each use case and use the sequence diagram to put the operations on the classes.
DON’T TRY TO DRAW FLOWCHARTS ON SEQUENCE DIAGRAMS
(FOCUS ON BEHAVIOR ALLOCATION INSTEAD)
UML 2.0 enables the creation of detailed flowcharts within sequence diagrams; however, this practice is discouraged as it shifts focus away from the core aspects of the problem.
Creating flowcharts often distracts from the essential focus needed when developing a sequence diagram When deriving software design from use cases, accurately assigning operations to classes is crucial This correct allocation of operations can significantly impact the overall design, making it a critical factor for success.
In the ICONIX Process, the sequence diagram serves a crucial role in clarifying behavior allocation, ensuring that these essential decisions are accurately represented Focusing on creating a flowchart can detract from the critical task of making informed behavior allocation choices.
Simple but effective You’ve then allocated all the software behavior you need, and pre- sumably nothing you don’t need, into your classes.
■ Tip When you’re starting a sequence diagram, the very first thing you should do is paste the text of the use case into a Note on the left margin.
A common inquiry we receive is whether a distinct sequence diagram is necessary for each alternative course of action This question typically arises among individuals working with extensive use case templates and lengthy ten-page use cases.
To maintain clarity and coherence, we prefer concise use cases that adhere to the two-paragraph rule outlined in Chapter 3 This approach allows us to illustrate both sunny and rainy-day scenarios within a single sequence diagram Splitting the use case and sequence diagrams can lead to confusion and the potential loss of critical alternate courses of action, which can create significant issues in understanding the overall process.
8 Start from Where You Left Off with Robustness Analysis
In your robustness diagram, you determined the collaborating objects for the sequence diagram If your use case involves a graphical user interface (GUI), the boundary objects will depict screens and various UI elements Additionally, entity classes from the domain model will interact with these GUI objects to facilitate functionality.
In numerous instances, controllers depicted in the robustness diagram may not correspond to actual "controller objects" in a sequence diagram; however, there are cases where they do Typically, in other situations, these controllers will translate into messages exchanged between objects within the sequence diagram.
A sequence diagram provides a more detailed and concrete representation of the system's design compared to the idealized conceptual design depicted in a robustness diagram It often includes additional elements such as helper infrastructure objects and specifics about persistence storage mechanisms.
7 Show How the Use Case’s Behavior Is Accomplished by the Objects
Critical Design Review Guidelines
The principles discussed in this chapter can be summed up as a list of guidelines Our top 10 list follows.
10 Make sure the sequence diagram matches the use case text.
9 Make sure (yes, again) that each sequence diagram accounts for both basic and alter- nate courses of action.
8 Make sure that operations have been allocated to classes appropriately.
7 Review the classes on your class diagrams to make sure they all have an appropriate set of attributes and operations.
6 If your design reflects the use of patterns or other detailed implementation constructs, make sure that these details are reflected on the sequence diagram.
5 Trace your functional (and nonfunctional) requirements to your use cases and classes to ensure you have covered them all.
4 Make sure your programmers “sanity check” the design and are confident they can build it and that it will work as intended.
3 Make sure all your attributes are typed correctly, and that return values and parameter lists on your operations are complete and correct.
2 Generate the code headers for your classes, and inspect them closely.
1 Review the test plan for your release.
Let’s walk through these top 10 CDR practices in more detail.
10 Make Sure the Sequence Diagram Matches the Use Case Text
To effectively trace behavior requirements, utilize a sequence diagram that visually aligns these requirements with the corresponding messages exchanged between objects The diagram should prominently display the clarified behavior requirements on the left margin, with the relevant objects and messages directly adjacent to each requirement This layout ensures that stakeholders can easily reference the detailed design while maintaining a clear connection to the original requirements.
The "highlighter test" proves to be an effective method during reviews By highlighting a sentence from the use case text in the margin and then marking the corresponding design messages that illustrate the required behavior, you can systematically verify each aspect Continue this process until the entire use case has been thoroughly evaluated.
9 Cover Both Basic and Alternate Courses of Action
Don’t make the mistake of saying YAGNI 2 about those pesky rainy-day scenarios They’re too important.
8 Make Sure That Operations Have Been Allocated to Classes Appropriately
Adhere to the principles of Responsibility-Driven Design (RDD) to ensure that each class maintains a cohesive and focused set of operations Utilizing automated tools can help differentiate between actual class operations and merely labeled messages on sequence diagrams, as indicated by the presence of parentheses “()” following the operation name on the message arrow.
7 Review the Attributes and Operations on Your Classes
To ensure your class diagrams are accurate, it’s crucial to review the classes for the appropriate attributes and operations A practical approach is to frequently cross-reference your sequence diagram with a detailed class diagram that lists all attributes and operations Since sequence diagrams can be prone to errors, it’s advisable to verify the placement of each operation after drawing each arrow, ensuring alignment with your intended design.
■ Tip Look for classes without attributes and for classes with “schizophrenic personalities” (i.e., unrelated sets of operations).
Occasionally, you may overload a class with excessive responsibilities, while other classes may end up with minimal or no responsibilities at all, as illustrated in the book example later in this chapter.
2 YAGNI stands for You Aren’t Gonna Need It, a much-loved saying among Extreme Programmers.
You’ll notice a responsibility-driven theme in the Internet Bookstore review later on The thought process behind assigning responsibilities to classes is summed up nicely by Rebecca
Wirfs-Brock in her book Designing Object-Oriented Software: 3
Responsibilities define the purpose of an object within a system and encompass the services it offers for the contracts it upholds By assigning responsibilities to a class, we ensure that every instance of that class, regardless of quantity, will adhere to these designated duties.
6 Make Sure the Chosen Design Patterns (Etc.) Are in Your Sequence Diagrams
In general, sequence diagrams should accurately represent the intended design for coding, without any magical or unrealistic elements.
5 Trace Your Requirements to Your Use Cases and Classes
Ensure that you map both functional and nonfunctional requirements to your use cases and classes to verify comprehensive coverage Tailor your formality level to suit the needs of your project and organization; however, this is the optimal time to trace requirements to your design Utilizing tools like EA can simplify this process through features such as a built-in traceability matrix.
4 Make Sure Your Programmers “Sanity Check” the Design
Involving programmers in the detailed design process is crucial, as relying solely on analysts can lead to inefficient or problematic designs that hinder effective implementation Collaboration between analysts and programmers ensures a more efficient and feasible design outcome.
3 Check for Correctness (Return Values, Typos, Etc.)
Ensure that all your attributes are accurately entered, and verify that the return values and parameter lists for your operations are complete and correct As you prepare to click the Generate Code button, it's crucial to have everything organized and ready.
2 Generate the Code Headers for Your Classes, and Inspect Them Closely
See, we told you that you were about to generate code Once you’ve done so, inspect the code headers carefully.
1 Review the Test Plan for Your Release
To effectively create a list of unit tests, focus on the logical software functions outlined by the controllers in your robustness diagrams It's important to note that each logical function may correspond to multiple messages in a sequence diagram, indicating the complexity of the testing process.
3 Rebecca Wirfs-Brock, Brian Wilkerson, and Laura Wiener, Designing Object-Oriented Software(Upper
To ensure comprehensive testing of each function, it is essential to perform unit tests By generating skeleton tests from the robustness diagram, you can effectively verify the logical outcomes of these functions.
Utilize the EA with the ICONIX Process add-in to automatically generate stub test cases for controllers in your robustness diagrams These test cases can be organized into a comprehensive test plan, and you can also create class and method skeletons for your unit tests efficiently.
In the second part of this chapter, we illustrate some of these points by following a CDR session for the Internet Bookstore.
Using the Class Diagrams to Find Errors on the
A highly effective technique during the CDR process involves utilizing class diagrams to identify errors in sequence diagrams This method requires the reviewer to closely examine different classes within the class diagram, searching for misplaced methods or other discrepancies, which ultimately leads to the identification of the problematic sequence diagrams.
During a recent training workshop, Doug encountered a Queue class that only included an Add method, with no items ever being removed from the queue Upon examining the sequence diagram intended for using the queue's items, he noticed that the message arrows were incorrectly directed, as the Pull Item from Queue method was assigned to the wrong class Although the Queue was correctly represented in the sequence diagram due to the automatic placement by the diagramming tool, the arrows were still drawn in reverse This incident highlights that many sequence diagram errors can be identified by reviewing the associated class diagram.
Critical Design Review in Practice:
Implementation Guidelines
The principles discussed in this chapter can be summed up as a list of guidelines Our top 10 guidelines list follows.
10 Be sure to drive the code directly from the design.
9 If coding reveals the design to be wrong in some way, change it But also review the process.
7 Always question the framework’s design choices.
6 Don’t let framework issues take over from business issues.
5 If the code starts to get out of control, hit the brakes and revisit the design.
4 Keep the design and the code in sync.
3 Focus on unit testing while implementing the code.
2 Don’t overcomment your code (it makes your code less maintainable and more difficult to read).
1 Remember to implement the alternate courses as well as the basic courses.
Let’s look at each guideline in turn.
10 Be Sure to Drive the Code Directly from the Design
You’ve spent the time producing a highly focused, unambiguous, clean, crisp design Make sure you use it! (However, see the next guideline.)
■ Tip Try to automate the process, and generate source code, SQL, XML, and so forth directly from the design diagrams whenever possible.
It is important to understand that generating SQL directly from a domain model is not advisable, as a domain model does not serve as a data model Instead, you should create a separate diagram to outline the database schema, which can then be used to generate the necessary SQL and Data Definition Language.
(DDL), and so forth from it.
9 If Coding Reveals the Design to Be Wrong in Some Way, Change It
When you recognize a problem in your project, it's crucial to address it immediately rather than hoping it will resolve itself amidst more code Fixing the design promptly ensures that both the code and design align effectively Additionally, it's essential to evaluate the design process that contributed to the issue by reviewing the milestones outlined in this book Consider whether the use cases were clearly defined and if there is a strong connection between the use case descriptions and the object model.
To ensure the production of error-free code, it's essential to provide programmers with the necessary space for concentration Simultaneously, it's crucial to maintain team cohesion by adhering to established design principles and coding conventions Integrating code inspection into the Code Review and Model Update processes, as discussed in Chapter 11, can enhance overall code quality.
INTERNET BOOKSTORE: GENERATING THE ENTITY CLASSES
Our Enterprise Architect (EA) model is now fully detailed with the necessary entity classes, including their attributes and operations Fortunately, EA offers valuable code generation capabilities, allowing us to produce a significant portion of the source code directly from the model Additionally, other CASE tools like Together and Rational XDE also provide similar code generation features For those looking for dedicated solutions, open-source options like XDoclet and commercial tools such as JGenerator can effectively handle much of the coding workload.
To effectively utilize Spring, it's essential to create multiple classes for each entity class, including a simple JavaBean entity class with getters and setters, a Data Access Object (DAO) interface, and its implementation The implementation will leverage a specific persistence framework, such as JDO or Hibernate, which integrates seamlessly with the Spring framework Additionally, you can design your database schema using UML, employing classes with the stereotype to generate the necessary SQL for creating database tables.
Automation of mechanical tasks is essential, as these are precisely the functions that computers excel at, making it advantageous to increase the level of automation wherever possible.
1 See www.sparxsystems.com.auand also www.iconixsw.com.
2 See www.borland.com/together.
3 See www-306.ibm.com/software/awdtools/developer/rosexde.
4 XDoclet is a code generation engine that operates by placing tags in your Java code Visit http:// xdoclet.sourceforge.net/xdocletfor more information.
5 JGenerator is an enterprise software automation tool from Javelin Software Visit www.javelinsoft.com/jgeneratorfor more information.
7 Always Question the Framework’s Design Choices
Questioning the design choices of platform creators is essential; otherwise, we would still be using inefficient entity beans that generate costly network traffic for each method call If a design decision imposed by a framework seems flawed, seek alternative solutions and consider switching to a different framework if needed.
6 Don’t Let Framework Issues Take Over from Business Issues
When framework design concerns overshadow customer business requirements in shaping the final product, it signals a significant problem This situation redefines the concept of "inversion of control," highlighting the need for a balanced approach that prioritizes client needs over technical constraints.
Using a framework can often raise questions about its necessity, as its primary purpose is to eliminate repetitive coding tasks and save time and effort However, if the chosen framework imposes excessive design-pattern requirements, burdensome XML configurations, or unreasonable rituals, it may be time to reconsider your options and explore alternatives.
5 If the Code Starts to Get out of Control, Hit the Brakes and Revisit the Design
If you've diligently followed our previous recommendations and the code remains chaotic, it's likely that there are significant underlying issues to resolve, such as whether the programmers are disregarding the design entirely.
After creating detailed sequence and class diagrams, programming should focus on implementing algorithmic details in small methods within cohesive classes The objective of this preparation is to maintain code organization; if you notice the code becoming chaotic, take a moment to reflect and address the root problems in your project.
To understand what went wrong, consider the following possibilities: your team may have failed to create an effective design, and this oversight wasn't addressed during the design review Additionally, programmers might have disregarded the established design principles and opted for an unstructured approach It's also possible that the programmers did not engage in the design process at all Ultimately, any combination of these factors—poor design, lack of adherence to it, and insufficient programmer involvement—can lead to significant issues in project execution.
4 Keep the Design and the Code in Sync
Certain development methodologies suggest allowing the code to evolve independently from the initial design, only updating the design when it becomes significantly outdated This often occurs when a substantial portion of the team inadvertently adheres to an outdated set of interfaces due to the design model no longer reflecting current needs.
6 Scott W Ambler, Agile Modeling: Effective Practices for eXtreme Programming and the Unified Process
(Hoboken, NJ: John Wiley & Sons, 2002), p 66.
Maintaining alignment between design and code is essential for efficiency By focusing on a streamlined design that remains practical, synchronizing the design model with the evolving code becomes a quick and infrequent task.
3 Focus on Unit Testing While Implementing the Code
Writing unit tests alongside your code is beneficial, as it allows you to ensure your code functions correctly and address any bugs immediately, rather than searching for them later.
■ Tip The tests can also be used to ensure that all of the use case scenarios have been implemented.
We demonstrate a technique for doing this in Chapter 12.
Code Review and Model Update Guidelines
The principles discussed in this chapter can be summed up as a list of guidelines Our top 10 list follows.
10 Prepare for the review, and make sure all participants have read the relevant review material prior to the meeting.
9 Create a high-level list of items to review, based on the use cases.
8 If necessary, break down each item in the list into a smaller checklist.
7 Review code at several different levels.
6 Gather data during the review, and use it to accumulate boilerplate checklists for future reviews.
5 Follow up the review with a list of action points e-mailed to all people involved.
4 Try to focus on error detection during the review, not error correction.
3 Use an integrated code/model browser that hot-links your modeling tool to your code editor.
2 Keep it “just formal enough” with checklists and follow-up action lists, but don’t overdo the bureaucracy.
1 Remember that it’s also a Model Update session, not just a Code Review.
Let’s look at these guidelines in more detail.
10 Prepare for the Review, and Make Sure All Participants Have Read the Relevant
Review Material Prior to the Meeting
Instead of holding a disorganized and unproductive meeting, consider adopting the XP approach by removing all chairs from the meeting room This encourages participation and focus, and you can enhance engagement by giving the meeting a catchy name, such as “Early Morning Stand-Up Meeting.”
9 Create a High-Level List of Items to Review, Based on the Use Cases
To ensure a thorough review, the high-level checklist should be derived from the use case titles rather than focusing solely on specific classes and methods This approach promotes a more organized evaluation process, increasing the likelihood of identifying behavior-related defects and uncovering any missing functionalities.
8 Break Down Each List Item into a Smaller Checklist (If Necessary)
Because the high-level checklist is essentially a list of use case titles, it’s possible to drive the fine-grained list from the controllers on the robustness diagrams.
For certain projects, a detailed breakdown of the list may not be required; a high-level checklist focused on use cases could be adequate for initially identifying the classes and methods that need to be reviewed.
7 Review Code at Several Different Levels
When reviewing code, ensure it adheres to coding conventions, design styles, and proper naming practices Additionally, compare the code against design specifications by analyzing the sequence diagrams Just as you can trace a use case through a sequence diagram, the code should also allow for a clear trace of the sequence diagram's path.
When reviewing code, it's essential to analyze the behavior descriptions outlined in the use case text and compare them with the scenario text in the code This process can help identify any missing functionality that may have been overlooked during the detailed design phase.
When method names do not align with actions described in the use case text, it indicates a disconnect between the code and the design This misalignment can stem from either poorly written code or inconsistencies between the use case and design To resolve this issue, it is essential to ensure a direct correlation between the code and the use case If needed, refactor the code into smaller methods with descriptive names that clearly relate back to the use cases.
6 Use Data Gathered During the Review to Accumulate Boilerplate Checklists for
Code reviews often reveal recurring issues that can be efficiently managed by creating a checklist This approach not only saves time but also ensures that critical problems are not overlooked Continuously expanding the checklist is essential, especially for identifying subtle issues that may go unnoticed, thus enhancing the review process.
If these checklists are in circulation around the company, then programmers can learn to avoid the same old issues in the first place, saving even more time!
5 Follow Up the Review with a List of Action Points E-mailed to All People Involved
Alternatively, have the meeting, assign action items, and never follow up to make sure the action items get done.
■ Tip Have a follow-up meeting to ensure that all the action points actually did get “actioned.”
4 Try to Focus on Error Detection During the Review, Not Error Correction
Making minor updates to the model during the review process is beneficial for ensuring consensus among team members However, significant code revisions or major design alterations should be addressed separately, necessitating a follow-up review meeting to discuss these changes thoroughly.
When implementing aspect-oriented programming (AOP), it is essential to organize your code in a structured manner For more insights, refer to the sidebar “Use Cases and Aspects” in Chapter 3.
3 Use an Integrated Code/Model Browser That Hot-Links Your Modeling Tool to Your
Utilizing the UML model for browsing Java code streamlines the programming process by saving time and ensuring that all updates are meticulously tracked, preventing any changes from being overlooked during future revisions.
2 Keep It “Just Formal Enough” with Checklists and Follow-up Action Lists
This chapter presents a balanced approach that lies between informal code reviews and formal code inspections, emphasizing the importance of maintaining a level of formality that is sufficient without introducing excessive bureaucracy.
While some documentation is essential to prevent oversight of individual items, excessive paperwork can result in analysis paralysis It’s important to identify when the review process has been beneficial and when it’s time to proceed without getting bogged down in unnecessary updates.
1 Remember That It’s Also a Model Update Session, Not Just a Code Review
Current development tools have advanced significantly, making it incredibly simple to maintain synchronization between models and code It is almost negligent not to leverage these powerful capabilities.
2 Douglas Adams fans will recognize the similarity between a “wrongly done” code review and a violent game of Brockian Ultra-Cricket.
THERE’S A RIGHT WAY AND A WRONG WAY TO CONDUCT A CODE REVIEW
Preparing for a code review is crucial, often resembling a chaotic scene where various heavy objects, like baseball bats and golf clubs, are thrown into the room This creates an environment where both the reviewer and the programmer scramble for makeshift weapons to defend their critiques and code.
Well, OK, that’s what happens when a code review goes wrong and is taken to its logical conclusion.
An effective code review is a collaborative discussion between a programmer and an impartial observer, focusing on the code's adherence to design principles rather than evaluating individual performance When personal abilities are scrutinized, it can lead to defensiveness, significantly diminishing the review's effectiveness.
Why Are Code Reviews Necessary After All That Design Work?
Design-Driven Testing Guidelines
The principles discussed in this chapter can be summed up as a list of guidelines Our top 10 list follows.
10 Adopt a “testing mind-set” wherein every bug found is a victory and not a defeat
If you find (and fix) the bug in testing, the users won’t find it in the released product.
9 Understand the different kinds of testing, and when and why you’d use each one.
Get to know the different types of testing that we describe later in this chapter (see the
The "V" model emphasizes the importance of timing in testing, ensuring that each test is conducted at the appropriate stage of development Additionally, it is crucial to utilize the deliverables generated throughout the process to prepare effectively for each test in advance.
8 When unit testing, create one or more tests for each controller on each robustness diagram.
When developing a design, it's essential to create one or more unit tests for every operation within each class In some cases, a controller may function as a single operation on a class, while in other instances, it may be implemented as multiple atomic operations.
7 For real-time systems, use the elements on state diagrams as the basis for test cases.
Testing the response to different events that trigger state changes is essential for monitoring the alterations in an object's attributes This process allows you to evaluate the interactions between the object's methods effectively Utilizing elements from state diagrams can serve as a solid foundation for developing test cases.
6 Do requirement-level verification, checking that each requirement you have identified is accounted for.
5 Use a traceability matrix to assist in requirement verification.
4 Do scenario-level acceptance testing for each use case.
3 Expand threads in your test scenarios to cover a complete path through the appropri- ate part of the basic course plus each alternate course in your scenario testing.
2 Use a testing framework such as JUnit to store and organize your unit tests.
1 Keep your unit tests fine-grained.
Testing should be considered an integral part of the iterative and incremental development life cycle, rather than a separate task performed after coding This approach is essential because tests validate that a product meets its intended purpose However, if the tests are not closely aligned with the specifications, they fail to provide meaningful validation, merely indicating that the test suite is functioning without demonstrating the product's actual suitability.
Tests alone do not provide significant evidence of software quality; they only demonstrate that certain parts of a program pass specific tests For tests to be meaningful, they must be intricately linked to the software requirements When tests are closely aligned with these requirements, successfully passing them indicates that the software is suitable for its intended purpose Conversely, if the tests do not closely match the requirements, their results hold little value.
A key to testing is to understand the different kinds of tests, and in particular when in the software life cycle each kind of test should be used.
Figure 12-1 shows which tests should be performed for each stage in ICONIX Process.
So, to test that the preliminary design has been implemented satisfactorily and to spec, you perform integration testing, and so on.
Preparation for various tests should start early, ideally right after the business case is finalized and approved.
Quality Assurance (QA) can start outlining release tests based on the business case details Concurrently, software testers can begin drafting system tests for each use case as soon as it is documented However, it is advisable to wait until the preliminary design of the use case is completed, as this will significantly influence the analysis of the use case.
Higher-level tests can often be structured as unit tests, allowing for direct integration with controllers in the preliminary design, which are influenced by use cases This approach enhances the effectiveness of testing by ensuring that unit test classes and methods are aligned with the overall system architecture.
Your team can now establish their own eXtreme Feedback Device (XFD), also known as a red/green lava lamp, to visually indicate the status of their build and unit tests For more information, visit www.pragmaticprogrammer.com/pa/pa.html.
Table 12-1 describes the different kinds of tests shown in Figure 12-1 2
Table 12-1 Different Kinds of Tests and When to Apply Them
Test When (and Why) You Should Do It
Unit testing Begin unit testing before integration/
The testing of individual software components system testing.
Stubs are utilized to mimic the inputs and outputs of a component during unit testing, allowing it to function independently This testing is performed on every build of the software throughout the development process, including the bug-fixing phase that occurs after the software has been released for system testing.
Figure 12-1 “V” model of software testing applied to ICONIX Process
2 The definitions in Table 12-1 are adapted from the British Computer Society Specialist Interest Group in Software Testing (BCS SIGIST) Thanks to Philip Nortey for contributing heavily to this section.
Test When (and Why) You Should Do It
Integration testing This is done after unit testing.
Testing performed to expose faults in the interfaces and in the interaction between integrated components
Unlike with compatibility testing (see the next test type), the classes are a part of the overall system being designed.
Compatibility testing This is not quite the same as integration
Testing that the system interoperates correctly with testing, although both take place at other, “external” systems with which it is required to roughly the same time. communicate.
System testing This is done after integration testing
Functional and behavioral test case design is essential in system testing, as it emphasizes developer selection based on a thorough analysis of component specifications The primary goal is to validate that the delivered system meets the specified requirements without considering its internal mechanisms.
Functional testing consists mainly of use case and business process path tests, but also includes testing of the functional requirements.
Acceptance testing Acceptance testing operates along the
Acceptance testing is a formal evaluation conducted by or for the customer to verify that the system meets the contractual requirements Unlike system testing, which focuses on overall functionality, acceptance testing specifically demonstrates that the system fulfills the actual requests made by the customer.
Beta testing This is done before acceptance testing to
End users conduct testing in a production-like environment, ensuring that the software is evaluated outside of the development context This approach allows for more accurate feedback and insights into the software's performance and usability.
Release testing This is done at the point at which the
The verification process ensures that the final product aligns with the customer’s business case and meets the specifications outlined in the original contract This assessment, conducted at the completion of a deliverable milestone, confirms that the software developed fulfills the project's goals and requirements.
In addition, some kinds of testing go on throughout the development process or aren’t based on a specific deliverable Table 12-2 shows the more common ones.
Table 12-2 More Kinds of Testing and When to Do Them
Test When You Should Do It
Nonfunctional requirements testing This testing should be done throughout
Nonfunctional requirements testing encompasses various evaluations that are not directly tied to the software life cycle, including performance, usability, stress, volume, and compatibility testing This comprehensive approach ensures that all aspects of the software's functionality are thoroughly assessed, contributing to a robust and reliable final product.
Test When You Should Do It
Design-Driven Testing Errors (the “Don’ts”)
To break with tradition, we’re presenting a top 10 list of the things you shouldn’t dowhen
Design-Driven Testing, in addition to the top 10 “do’s” from the start of the chapter
10 Go overboard with mock objects.
Mock objects can facilitate your testing process, but their effectiveness diminishes over time, leading to potential pitfalls in your code quality.
Unit test: Assert that the mock object returns 3.0 Mock object: Return 3.0
Relying solely on unit tests and mock objects can create a false sense of security in software quality, as they often validate each other rather than the actual functionality Even with over 1,000 mock objects providing expected values, this approach fails to enhance the overall reliability of your software.
9 Duplicate alternate course scenarios in the alternate test scenarios for basic course controllers.
When brainstorming test case scenarios, it's crucial to avoid duplicating rainy-day scenarios that have already been considered during the alternate use case brainstorming Ensure that these rainy-day test scenarios are properly categorized within the relevant alternate course test cases to maintain clarity and effectiveness.
8 Forget to tie the tests closely to the requirements.
7 Leave testing until after the code has been written.
Effective software development aligns with the XP philosophy, emphasizing that testing should start well before coding begins Proactive testing and preparation are crucial for identifying potential issues early on While retrospective testing can help catch some bugs post-development, initiating testing in the early stages can significantly reduce the number of defects, leading to a more efficient and reliable coding process.
In this book, we've emphasized the crucial role of designing your project before diving into coding and testing One effective approach to achieve this is by writing unit tests, which serve as a foundational strategy for designing your code effectively.
Test-Driven Development [TDD]), but we feel that it’s much more efficient and more
“bulletproof” to design using the process we’ve described, and then write the tests to validate and further hone the design.
When encountering patches of buggy code, it’s crucial to investigate the underlying causes and address the issues at their source Keep in mind that the likelihood of discovering additional bugs in a specific code segment rises as more bugs are identified within that same segment.
■ Tip When fixing a bug, always start by writing a test that will fail if the bug reoccurs.
4 Use brute force testing instead of identifying and then targeting “test hot spots” from your preliminary design.
3 Use the wrong kind of testing for the wrong situation.
2 Forget to do any testing at all.
1 Test so thoroughly that you never release the product.
This section provides a list of questions that you can use to test your knowledge of DDT.
1 Which of the following would you use to specify your system tests? a) Robustness diagrams b) Use cases c) Sequence diagrams d) Conceptual design
Integration testing focuses on identifying faults in the interactions between internal classes, while compatibility testing ensures that the system functions correctly with external systems and components.
Integration testing verifies that the delivered system meets the specified requirements, while compatibility testing ensures that the system functions correctly with external systems and components Additionally, integration testing confirms that the system fulfills the actual requests made, whereas compatibility testing identifies any faults in the interaction between internal classes.
3 Unit tests are derived from, and check the processing logic contained in, which of the following? a) Controllers b) Boundary classes c) Entity classes d) Use cases
4 What’s the maximum number of test methods you should have in each unit test class?
What can happen if the test class (or the individual test methods) grows too large?
In software testing, it is essential to closely tie the unit tests to the classes and methods being tested to ensure accurate validation of functionality Additionally, maintaining a clear connection between boundary classes in the preliminary design and the setup methods in unit test classes enhances the testing process It is also beneficial to align controller method names with unit test class names for better organization However, unit test methods should be kept fine-grained rather than coarse-grained to allow for precise testing of individual functionalities.
6 Describe when mock objects are beneficial, and also describe the “point of diminish- ing returns” when they cease to be useful.
7 Why is aggregation a preferable design strategy to generalization when creating test classes?
8 For each use case, should the alternate courses be tested in the same test class as the basic course? Explain your answer.
This chapter explored different types of use case-driven testing, detailing the appropriate scenarios for each method Additionally, we provided a practical example of Design-Driven Testing (DDT) applied to the Internet Bookstore, including the development of unit tests for the Show Book Details use case.
Figure 12-16 shows where we are The activities covered in this chapter are shown in red.
For a comprehensive exploration of integrating use case-driven development with Test-Driven Development (TDD), refer to the detailed discussion and examples provided in "Agile Development with ICONIX Process" (Apress, 2005).
This chapter emphasizes that tests are ineffective unless they are closely aligned with the specific requirements, while still maintaining a clear distinction between the two In the concluding chapter, we will explore the role of requirements and their integration within the overall process.
Figure 12-16 Testing activities during the implementation stage
W e’ve held off on discussing requirements until the end of the book for a couple of reasons.
There is often confusion surrounding the distinctions between requirements, use cases, and operational behavior To clarify these concepts, we previously discussed use cases in Chapter 3 and behavior allocation in Chapter 8, along with various techniques related to use cases and operations in later chapters This context allows for a clearer understanding of requirements by contrasting them with these related elements.
The requirements process outlined in this chapter is not a fundamental component of the ICONIX Process, which is why it appears at the end This is primarily because various organizations adopt distinct strategies for managing requirements.
In many organizations, requirements are imposed from upper management, limiting the flexibility to modify the requirements elicitation process This can lead to a variety of approaches to handling requirements, often differing with each software development project However, by embracing the concepts discussed in this chapter, you can enhance customer satisfaction with your deliverables.
In this section we describe the theory behind requirements gathering in a use case–driven project First up are our top 10 requirements gathering guidelines.
Requirements Gathering Guidelines
The principles discussed in this chapter can be summed up as a list of guidelines Our top 10 list follows.
10 Use a modeling tool that supports linkage and traceability between requirements and use cases.
9 Link requirements to use cases by dragging and dropping.
8 Avoiddysfunctional requirementsby separating functional details from your behav- ioral specification.
7 Write at least one test case for each requirement.
6 Treat requirements as first-class citizens in the model.
5 Distinguish between different types of requirements.
4 Avoid the “big monolithic document” syndrome.
3 Create estimates from the use case scenarios, not from the functional requirements.
2 Don’t be afraid of examples when writing functional requirements.
1 Don’t make your requirements a technical fashion statement.
Let’s look at each of these items in more detail.
10 Use a Modeling Tool That Supports Linkage and Traceability
In the past, visual modeling tools lacked built-in support for allocation and traceability, often requiring costly additional software modules and consulting services to integrate them effectively Fortunately, advancements in technology have led to significant improvements, allowing for a more streamlined and rational approach to these processes today.
Enterprise Architect (EA) facilitates the seamless drag-and-drop allocation of requirements, along with the automatic creation of a requirements traceability matrix, which will be illustrated with an example later in this chapter.
9 Link Requirements to Use Cases by Dragging and Dropping
In this chapter, we demonstrate how to link elements in your model to specific requirements by simply dragging the requirement onto the element This method is particularly effective with use cases, allowing you to automatically generate a traceability matrix that illustrates how all behavioral requirements connect to the customer's original high-level requirements.
A concerning trend in use case writing is the mixing of functional requirement statements with scenario text, a practice that has gained popularity among various organizations This style, which we refer to as the intermangling of requirements and scenario text, has been frequently observed in recent Jumpstart classes, prompting us to address its prevalence in this chapter.
The blending of passive voice requirement statements with active voice scenario text leads to confusion, making it difficult to distinguish between use cases and requirements documents This ambiguity raises questions about the nature of the content, leaving readers uncertain whether they are encountering functional, nonfunctional, or behavioral requirements.
I’m reading here? The use cases are rendered well, useless, actually.
Separating active voice (use case) elements from passive voice (requirement) components in specifications enhances clarity and usability When mixed, these elements become less effective, leading us to label this approach as "dysfunctional requirements." This term reflects the confusing nature of specifications that oscillate between functional requirements and use case steps, resulting in a lack of coherence and purpose.
Intermangled requirements and use cases can lead to dysfunction because they obscure the clarity needed to align use cases with the object model To effectively understand user interactions with the system, all use case descriptions must be written in active voice Therefore, it is essential to separate these elements before attempting to clarify them, as this process is crucial for effective system design.
The ICONIX Process is grounded in real-world application, with Doug dedicating over 20 weeks annually to fieldwork on actual projects, primarily focusing on new developments for existing clients With more than a decade of experience, we have gained valuable insights into the effectiveness of various strategies within this process.
DISINTERMANGLING DYSFUNCTIONAL REQUIREMENTS FROM THE SCENARIO TEXT
Dysfunctional requirements are functional requirements mistakenly included in use case scenario texts, which should exclusively focus on behavioral requirements For clarity, consider the example where the dysfunctional text is highlighted in red.
The user clicks the Advanced Search button on the hub page.
The system displays the Advanced Search page.
[REQUIREMENT] On this page, there are two search fields: Search by Title, Search by Author; and search options:
[REQUIREMENT] Order results by sales rank;
[REQUIREMENT] Order results alphabetically by Title;
[REQUIREMENT] Order results alphabetically by Author;
7 Write at Least One Test Case for Each Requirement
Ensure that your tests are closely aligned with the requirements While not every test needs to directly trace back to a specific requirement, it is essential to have at least one test that verifies the correct implementation of each requirement.
In Chapter 12, we describe several techniques for tying your requirements closely to your test cases.
6 Treat Requirements As First-Class Citizens in the Model
Give each requirement a short, catchy name, just as you would a use case or a class.
5 Distinguish Between Different Types of Requirements
Requirements specs tend to be a mixture of high- and low-level requirements, of busi- ness requirements and technical notes—whatever the driving force is that has pushed
[REQUIREMENT] Order results by date.
The user enters a book title and clicks the Submit button.
[REQUIREMENT] The search results should be fine-tuned to be displayed to the user in no more than five seconds.
The system displays the Search Results Page.
Robustness analysis serves to clarify and streamline requirements by separating intertwined elements from use case texts It is essential to identify and relocate nonfunctional requirements, which, although important, do not belong within the use case itself Instead, these requirements should be documented in distinct elements linked to the relevant use cases, ensuring clarity and coherence in the overall requirements framework.
If that doesn’t seem to make sense, perhaps this will help:
We remove dysfunctionalityfrom the requirements by disintermanglingthem from the scenario text and then disambiguatingthem, in preparation for prefactoring the design.
Hopefully that clears things up a little
Vicious intermangling poses a significant risk in project management, particularly when functional requirements are redundantly repeated within every use case associated with them An illustrative case occurred in Phoenix, where an individual acknowledged that some requirements were repeated as many as 70 or 80 times, raising the question of whether there were truly distinct requirements or merely a single one reiterated multiple times To avoid such confusion, it is essential to categorize requirements into distinct sections based on their types, such as functional, data, performance, capacity, and test requirements.
4 Avoid the “Big Monolithic Document” Syndrome
Treat the functional spec as a collection of short, highly focused, interlinked documents linked back to from the use cases, instead of one big impenetrable 200-page tome.
3 Don’t Create Estimates Directly from the Functional Requirements
To effectively estimate project requirements, start by breaking them down into specific use cases, as outlined in Chapter 3 Following this, generate estimates based on these use cases For enhanced accuracy, consider creating robustness diagrams, referenced in Chapter 5, and derive estimates from the associated list of controllers.
2 Don’t Be Afraid of Examples When Writing Functional Requirements
When creating functional requirements specifications, it's essential to incorporate numerous examples, as they effectively clarify points more succinctly than lengthy explanations Additionally, ensuring that these examples are engaging will help maintain the reader's interest.
1 Don’t Make Your Requirements a Technical Fashion Statement
In this age of trendy open source web frameworks and fashionable coding methodologies, it’s easy to drive the project from such “requirements” as “Must use EJB 3.0,” “Must use AOP,”
“Must use Spring Framework,” and so forth Similarly, projects can end up being delayed because the developers wanted to spend longer “improving the design” before releasing to the customer.
Projects focused solely on technical requirements often disconnect from the core business motivator: profit When developers prioritize design patterns over the financial goals of the business, the project strays from its essential purpose, losing sight of the real-world forces that drive success.