SlideShare a Scribd company logo
1 of 18
CSK –oxford Engineering College -trichy
 It applies across all the components of the
system which includes.
 Supplemental requirements
 Financial requirements
 Enterprise requirements
 Three characteristics of performance that
reflect customer’s impact are
 Operational suitability
 Supportability and
 Confidence.
 Operational suitability:
 Measure of how well our network design can be
configured, monitored and adjusted by the
customer’s operators.
 Supportability:
 Measure of how well the customer can keep the
system performing as designed, over the entire
life of the system.
 Confidence:
 Measure of the ability of the network to deliver
data without error or loss at the required
throughput(rate of production).
 During the requirements analysis phase:
 The network engineer ensures that the customer
understands the trade-offs(quality/aspect) between
cost and performance.
 Engineer prepares customers network has
exceeded the design capacity thus
 An upgrade (or)
 Service life extension (or)
 Replacement.
 Network design to support 1000 connections
should be aware that, when their becomes
20,000 connections, they need an entirely
different network.
 These three factors must be taken into
account when contracting for external
services,
 Such as
 WAN, MAN (or)
 ISP connections (or)
 Maintenance services.
 Funding to network devices and services,
instead of including of the parts of the
system(ex: desktop computer and servers).
 Funding is bounded by an overall cost limit,
 consisting of both (
 One time cost.
 Recurring cost (repeatedly/ periodically).
 One time cost :
 Based on the actual planning and construction of the
network.
 Consist of network architecture, design,
procurement(external source), deployment, integration,
testing network hardware / software components, the
initial installation or establishment of any services from
service providers.
 Recurring cost :
 Tasks and items that are expected / replaced / upgraded
on a periodic basis.
 This includes network OAM&P (Operations,
Administration, Maintenance & Provisions(supply)),
modifications(edit) to the network.
 Time frames for recurring costs vary ,
 Driven by customer/ user/ administrative,
management financial cycles(accrual accounting,
audit, budget cycle, budget execution),
technology cycles(development phase).
 Financial requirements gathered during the
analysis process.
 Enterprise requirements are
 Phone, FAX, voice based and video based.
 The integration of these types of requirements
over the same transmission infrastructure as data
is becoming common.
 It shows the location dependencies between
application and devices.
 MAP: Requirement analysis, gathering,
deriving and determining requirements from
variety of sources including users,
management, application and staff.
 Requirements specification: (figure refer
book)
 ID/Name , date, type Description, gathered /
delivered, Locations, status, priority.
 ID/ Name : name of the requirement
 Date : indicates the date that the
requirement was developed.
 Type: component from which requirements
(user, application, device, network or other)
 Description: details for the requirements. It
indicate functional / non – functional.
 Gathered / Derived: a requirement was
gathered, this where it is gathered.
Requirements was derived, this how it was
derived.
 Locations: where this requirement applies in
the environment.
 Status : represents the current state of this
requirement(core or fundamental, features,
future requirements, rejected
requirements).
 Priority:
 representing priority level of this requirement.
 s/w requirements may be managed and tracked
through common word – processing and spread
sheet software applications.

 Gathering requirements for building a LAN
network, the result as follows
 150 users:
 (60 – Engineers)
 (15 – HR Executives) & finance
 (30 - Manufacturer)
 (10 - management)
 (30 – sales / marketing)
 (05 - others)
 Each area in the building must support fast
Ethernet connection to the backbone.
 Inventory application for manufacturing
requirements not determined at this time.
 Database application require a minimum of
150 kb/s per session.
 Visualization application finance requires up
to 40 mb/s cap and 100 ms round trip delay.
 Payroll applications(financial records of
salaries for an employee, wages, bonuses and
deductions) require 100% uptime between
finance and outside payroll company.
 Company must be kept secure from internet
attacks.
 Other general applications:
 Mail.
 Word processing
 Internal / external web access.
THANK YOU

More Related Content

What's hot

Requirements Gathering Best Practice Pack
Requirements Gathering Best Practice PackRequirements Gathering Best Practice Pack
Requirements Gathering Best Practice PackAmy Slater
 
Analysis & Business Requirements
Analysis & Business RequirementsAnalysis & Business Requirements
Analysis & Business RequirementsHeinz Tonn
 
10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirements10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirementsz-999
 
The Art and Science of Requirements Gathering
The Art and Science of Requirements GatheringThe Art and Science of Requirements Gathering
The Art and Science of Requirements GatheringVanessa Turke
 
Requirement Management 2
Requirement Management 2Requirement Management 2
Requirement Management 2pikuoec
 
BRD Best Practices
BRD Best PracticesBRD Best Practices
BRD Best PracticesYev Ioffe
 
BABoK V2 Requirements Elicitation (RE)
BABoK V2 Requirements Elicitation (RE)BABoK V2 Requirements Elicitation (RE)
BABoK V2 Requirements Elicitation (RE)AMJAD SHAIKH
 
The Mysterious Process of Business Analysis Solved
The Mysterious Process of Business Analysis SolvedThe Mysterious Process of Business Analysis Solved
The Mysterious Process of Business Analysis SolvedHeadChannel
 
Business analyst 101 program Mumbai India
Business analyst 101 program Mumbai IndiaBusiness analyst 101 program Mumbai India
Business analyst 101 program Mumbai IndiaDeepak Kadam
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysiscsk selva
 
Requirements Gathering for Project Management Success
Requirements Gathering for Project Management SuccessRequirements Gathering for Project Management Success
Requirements Gathering for Project Management SuccessWG Consulting
 
Analyzing Business Requirements in a Visible Enterprise
Analyzing Business Requirements in a Visible EnterpriseAnalyzing Business Requirements in a Visible Enterprise
Analyzing Business Requirements in a Visible EnterpriseDafna Levy
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysisSangeet Shah
 
Getting to the core, requirements gathering in the wild
Getting to the core, requirements gathering in the wildGetting to the core, requirements gathering in the wild
Getting to the core, requirements gathering in the wildFemke Goedhart
 
Software Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzSoftware Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzImran Hussain Khan
 
Best Practices For Business Analyst - Part 3
Best Practices For Business Analyst - Part 3Best Practices For Business Analyst - Part 3
Best Practices For Business Analyst - Part 3Moutasm Tamimi
 

What's hot (18)

Requirements Gathering Best Practice Pack
Requirements Gathering Best Practice PackRequirements Gathering Best Practice Pack
Requirements Gathering Best Practice Pack
 
Analysis & Business Requirements
Analysis & Business RequirementsAnalysis & Business Requirements
Analysis & Business Requirements
 
10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirements10 Techniques for Gathering Requirements
10 Techniques for Gathering Requirements
 
The Art and Science of Requirements Gathering
The Art and Science of Requirements GatheringThe Art and Science of Requirements Gathering
The Art and Science of Requirements Gathering
 
SMART Requirements
SMART RequirementsSMART Requirements
SMART Requirements
 
Requirement Management 2
Requirement Management 2Requirement Management 2
Requirement Management 2
 
BRD Best Practices
BRD Best PracticesBRD Best Practices
BRD Best Practices
 
requirement documentation
requirement documentation requirement documentation
requirement documentation
 
BABoK V2 Requirements Elicitation (RE)
BABoK V2 Requirements Elicitation (RE)BABoK V2 Requirements Elicitation (RE)
BABoK V2 Requirements Elicitation (RE)
 
The Mysterious Process of Business Analysis Solved
The Mysterious Process of Business Analysis SolvedThe Mysterious Process of Business Analysis Solved
The Mysterious Process of Business Analysis Solved
 
Business analyst 101 program Mumbai India
Business analyst 101 program Mumbai IndiaBusiness analyst 101 program Mumbai India
Business analyst 101 program Mumbai India
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Requirements Gathering for Project Management Success
Requirements Gathering for Project Management SuccessRequirements Gathering for Project Management Success
Requirements Gathering for Project Management Success
 
Analyzing Business Requirements in a Visible Enterprise
Analyzing Business Requirements in a Visible EnterpriseAnalyzing Business Requirements in a Visible Enterprise
Analyzing Business Requirements in a Visible Enterprise
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Getting to the core, requirements gathering in the wild
Getting to the core, requirements gathering in the wildGetting to the core, requirements gathering in the wild
Getting to the core, requirements gathering in the wild
 
Software Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzSoftware Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyz
 
Best Practices For Business Analyst - Part 3
Best Practices For Business Analyst - Part 3Best Practices For Business Analyst - Part 3
Best Practices For Business Analyst - Part 3
 

Viewers also liked

Innovation Benefits Realization for Industrial Research (Part-3)
Innovation Benefits Realization for Industrial Research (Part-3)Innovation Benefits Realization for Industrial Research (Part-3)
Innovation Benefits Realization for Industrial Research (Part-3)Iain Sanders
 
White Paper: Application Modernization
White Paper: Application Modernization  White Paper: Application Modernization
White Paper: Application Modernization EMC
 
Business Requirements Gathering - Current & Future State
Business Requirements Gathering - Current & Future StateBusiness Requirements Gathering - Current & Future State
Business Requirements Gathering - Current & Future StateJason Bargent
 
Business Analysis Techniques
Business Analysis TechniquesBusiness Analysis Techniques
Business Analysis TechniquesIIBA UK Chapter
 

Viewers also liked (6)

Innovation Benefits Realization for Industrial Research (Part-3)
Innovation Benefits Realization for Industrial Research (Part-3)Innovation Benefits Realization for Industrial Research (Part-3)
Innovation Benefits Realization for Industrial Research (Part-3)
 
Benefit Realization Management iZenBridge
Benefit Realization Management  iZenBridgeBenefit Realization Management  iZenBridge
Benefit Realization Management iZenBridge
 
White Paper: Application Modernization
White Paper: Application Modernization  White Paper: Application Modernization
White Paper: Application Modernization
 
Business Requirements Gathering - Current & Future State
Business Requirements Gathering - Current & Future StateBusiness Requirements Gathering - Current & Future State
Business Requirements Gathering - Current & Future State
 
Business analysis compass mapping to the iiba babok v2
Business analysis compass mapping to the iiba babok v2Business analysis compass mapping to the iiba babok v2
Business analysis compass mapping to the iiba babok v2
 
Business Analysis Techniques
Business Analysis TechniquesBusiness Analysis Techniques
Business Analysis Techniques
 

Similar to Other requirements, requirement specification and map

Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysiscsk selva
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementscsk selva
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirementscsk selva
 
service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...csk selva
 
On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?Callidus Software
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015Mark S. Mahre
 
CV of Sourav Seal
CV of Sourav SealCV of Sourav Seal
CV of Sourav SealSourav Seal
 
Software Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docxSoftware Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docxrosemariebrayshaw
 
Apq Qms Project Plan
Apq Qms Project PlanApq Qms Project Plan
Apq Qms Project PlanEng-Mohammad
 
Hybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShareHybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShareHewlett-Packard
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White PaperBrian Hedstrom
 
Capacity and Demand Management
Capacity and Demand ManagementCapacity and Demand Management
Capacity and Demand ManagementVishwanath Ramdas
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfAnil
 
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...Cisco Canada
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategykatharine300
 
Developing supplemental performance requirements
Developing supplemental performance requirementsDeveloping supplemental performance requirements
Developing supplemental performance requirementscsk selva
 

Similar to Other requirements, requirement specification and map (20)

Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirements
 
service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...
 
On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
 
CV of Sourav Seal
CV of Sourav SealCV of Sourav Seal
CV of Sourav Seal
 
Software Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docxSoftware Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docx
 
chapter 2.pdf
chapter 2.pdfchapter 2.pdf
chapter 2.pdf
 
Apq Qms Project Plan
Apq Qms Project PlanApq Qms Project Plan
Apq Qms Project Plan
 
Yongsan presentation 3
Yongsan presentation 3Yongsan presentation 3
Yongsan presentation 3
 
Hybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShareHybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShare
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
 
XSI_LGfederal
XSI_LGfederalXSI_LGfederal
XSI_LGfederal
 
Acma Computers - Fms & Ims
Acma Computers - Fms & ImsAcma Computers - Fms & Ims
Acma Computers - Fms & Ims
 
Capacity and Demand Management
Capacity and Demand ManagementCapacity and Demand Management
Capacity and Demand Management
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategy
 
Developing supplemental performance requirements
Developing supplemental performance requirementsDeveloping supplemental performance requirements
Developing supplemental performance requirements
 

More from csk selva

Network design
Network designNetwork design
Network designcsk selva
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architecturescsk selva
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
 
Network architecture
Network architectureNetwork architecture
Network architecturecsk selva
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modifiedcsk selva
 
Flow spec algorithm
Flow spec algorithmFlow spec algorithm
Flow spec algorithmcsk selva
 
Flow analysis overview
Flow analysis overviewFlow analysis overview
Flow analysis overviewcsk selva
 
Thresholds and limits
Thresholds and limitsThresholds and limits
Thresholds and limitscsk selva
 
Requirements mapping
Requirements mappingRequirements mapping
Requirements mappingcsk selva
 
Developing service metrics
Developing service metricsDeveloping service metrics
Developing service metricscsk selva
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirementscsk selva
 
Developing requirements specification
Developing requirements specificationDeveloping requirements specification
Developing requirements specificationcsk selva
 
Developing delay requirements
Developing delay requirementsDeveloping delay requirements
Developing delay requirementscsk selva
 
Developing capacity requirements
Developing capacity requirementsDeveloping capacity requirements
Developing capacity requirementscsk selva
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURcsk selva
 
overview of analysis, architecture and design process
overview of analysis, architecture and design processoverview of analysis, architecture and design process
overview of analysis, architecture and design processcsk selva
 

More from csk selva (17)

Network design
Network designNetwork design
Network design
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modified
 
Flow spec algorithm
Flow spec algorithmFlow spec algorithm
Flow spec algorithm
 
Flow models
Flow modelsFlow models
Flow models
 
Flow analysis overview
Flow analysis overviewFlow analysis overview
Flow analysis overview
 
Thresholds and limits
Thresholds and limitsThresholds and limits
Thresholds and limits
 
Requirements mapping
Requirements mappingRequirements mapping
Requirements mapping
 
Developing service metrics
Developing service metricsDeveloping service metrics
Developing service metrics
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirements
 
Developing requirements specification
Developing requirements specificationDeveloping requirements specification
Developing requirements specification
 
Developing delay requirements
Developing delay requirementsDeveloping delay requirements
Developing delay requirements
 
Developing capacity requirements
Developing capacity requirementsDeveloping capacity requirements
Developing capacity requirements
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOUR
 
overview of analysis, architecture and design process
overview of analysis, architecture and design processoverview of analysis, architecture and design process
overview of analysis, architecture and design process
 

Recently uploaded

STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 

Recently uploaded (20)

STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 

Other requirements, requirement specification and map

  • 1. CSK –oxford Engineering College -trichy
  • 2.
  • 3.  It applies across all the components of the system which includes.  Supplemental requirements  Financial requirements  Enterprise requirements
  • 4.  Three characteristics of performance that reflect customer’s impact are  Operational suitability  Supportability and  Confidence.  Operational suitability:  Measure of how well our network design can be configured, monitored and adjusted by the customer’s operators.
  • 5.  Supportability:  Measure of how well the customer can keep the system performing as designed, over the entire life of the system.  Confidence:  Measure of the ability of the network to deliver data without error or loss at the required throughput(rate of production).  During the requirements analysis phase:  The network engineer ensures that the customer understands the trade-offs(quality/aspect) between cost and performance.
  • 6.  Engineer prepares customers network has exceeded the design capacity thus  An upgrade (or)  Service life extension (or)  Replacement.  Network design to support 1000 connections should be aware that, when their becomes 20,000 connections, they need an entirely different network.
  • 7.  These three factors must be taken into account when contracting for external services,  Such as  WAN, MAN (or)  ISP connections (or)  Maintenance services.
  • 8.  Funding to network devices and services, instead of including of the parts of the system(ex: desktop computer and servers).  Funding is bounded by an overall cost limit,  consisting of both (  One time cost.  Recurring cost (repeatedly/ periodically).
  • 9.  One time cost :  Based on the actual planning and construction of the network.  Consist of network architecture, design, procurement(external source), deployment, integration, testing network hardware / software components, the initial installation or establishment of any services from service providers.  Recurring cost :  Tasks and items that are expected / replaced / upgraded on a periodic basis.  This includes network OAM&P (Operations, Administration, Maintenance & Provisions(supply)), modifications(edit) to the network.
  • 10.  Time frames for recurring costs vary ,  Driven by customer/ user/ administrative, management financial cycles(accrual accounting, audit, budget cycle, budget execution), technology cycles(development phase).  Financial requirements gathered during the analysis process.
  • 11.  Enterprise requirements are  Phone, FAX, voice based and video based.  The integration of these types of requirements over the same transmission infrastructure as data is becoming common.
  • 12.  It shows the location dependencies between application and devices.  MAP: Requirement analysis, gathering, deriving and determining requirements from variety of sources including users, management, application and staff.  Requirements specification: (figure refer book)  ID/Name , date, type Description, gathered / delivered, Locations, status, priority.
  • 13.  ID/ Name : name of the requirement  Date : indicates the date that the requirement was developed.  Type: component from which requirements (user, application, device, network or other)  Description: details for the requirements. It indicate functional / non – functional.  Gathered / Derived: a requirement was gathered, this where it is gathered. Requirements was derived, this how it was derived.
  • 14.  Locations: where this requirement applies in the environment.  Status : represents the current state of this requirement(core or fundamental, features, future requirements, rejected requirements).  Priority:  representing priority level of this requirement.  s/w requirements may be managed and tracked through common word – processing and spread sheet software applications. 
  • 15.  Gathering requirements for building a LAN network, the result as follows  150 users:  (60 – Engineers)  (15 – HR Executives) & finance  (30 - Manufacturer)  (10 - management)  (30 – sales / marketing)  (05 - others)
  • 16.  Each area in the building must support fast Ethernet connection to the backbone.  Inventory application for manufacturing requirements not determined at this time.  Database application require a minimum of 150 kb/s per session.  Visualization application finance requires up to 40 mb/s cap and 100 ms round trip delay.  Payroll applications(financial records of salaries for an employee, wages, bonuses and deductions) require 100% uptime between finance and outside payroll company.
  • 17.  Company must be kept secure from internet attacks.  Other general applications:  Mail.  Word processing  Internal / external web access.