Professional Documents
Culture Documents
MERISE
MERISE
COURSE OUTLINE:
This course lays the foundation by using the method of MERISE in which
simple models of different management cases to be use . It will allow the
student to know the concept of information system and method, Development
and realization of a computerize information system. Therefore at the end of
this course the student must be able to
Introduction:
In a context of strong transformation in a company the information system
take an increasingly strategic place with value change . it is now present in all
businesses of an organization huge infinite are put in contribution or invested
for the implementation of an I.S in other to optimize benefits. Information is
the bases of communication within an organization and is closely link in the
decision making process it is a factor of productivity and competitiveness and
therefore has a greater value in the achievement of an organization objective it
is essential for an organization to have a good information system
I. DEFINITION OF CONCEPT
Classif Critici
y ze
Has Has
right context
Information
Has a
contex A form
Has
size
A cost Has
Value
CONSTRAINT CONSTRAINTS
Physical flow
Operating system
External enviroment
Piloting(decision) system
coordination objectives (members of
the direction)
Threated information
decision
Information System
External - Collect Information
information - Stores data toward
- Treats the exterior
- Transform
collected infomation
input flow
output flow
Operating system
- Production action
- (set of the executing personel)
The I.S has two dimensions that of the organization that transform undertake
communicate and record information then that of the computer system
artificial object conceived by man that allows the generations. The acquisition
the treatment the storage the transmission and the return of the information
to the service of the management of the extended enterprise . the function
aspect of the information system can be describe as five major function
a) Generate data : the static point of an information is the data to wish we
apply a sense such that it exist and can be use for more or less
commendable use depending on the context of the environment
b) Collect information : the collection of data result from the day to day
activities of an organization which involve recording the generated data
the information system does not produce information by it self it must
take information somewhere . there are two possibilities . the first is that
information is produce by human, the second is that information is
directly transmitted by another information system.
c) Store information : This implies a transfer of data over time . the
storage make it possible to ensure the durability of an information.it
guarantee a durable and reliable storage. The privilege media of
information today are the disc of computers the dbms is a funder mental
component of the I.S however paper remain a very use medium in
companies and the preservation of the paper alcalde is some time a
legal obligation.
d) Process information : to be exploitable information undergoes
treatment (EX salting of order by date and customers calculation of the
amount to be paid classification summary etc)
e) This treatment can either be manual or automatic . for example for the
sale of air line ticket knowing the number of ticket is insufficient the
information system will calculate the number of site remaining on each
flight so as not to sell a higher number of ticket than the available.
f) Transfer information : information should be transferred to the right
person . This transfer of information can be done by the oral form by
paper support or by digital medium.
ISL
MIS DSS
TPS
VI. SECURING THE IS: Information security is about protecting all data access for
whatever purposes Wikipedia define the security of IS as follows “ all technical
organizational legal and human resources put in place conserve restores and
guaranteeing the information system of am organization”. Data is the wealth of a
company because they are . information system relies as a rule in
computer system they include: telecommunication data, Analog point
,IP(internet protocol) voice, and in some in cases paper data.
Such system learn themselves to a variety of threat that can alter or destroy the information
(information integrity) or to reveal to third parties who should not be aware of it
(Information confidentiality ) or for example to undermined it availability (system
availability). Some of this threat can also indirectly cause significant financial damages . the
main real threat to which information system can be confronted are
- Malicious software : it as software design to harm or abuse
resources on a system opening the door with intrusion or altering
data. Personal data may be collected without the knowledge of the
users and be use for malicious or commercial purposes
- An attacker: it is person who manages to break into a system
legally or not an access to data or programs which does not
concern him.
- A disaster : it can be theft , fire water damage.
The security of information system , must be address in a global context :
- Network security :
- Security of the Operating system:
- Telecommunication security:
- Application security :
- Information security:
- Data security:
- Physical security:
Most of the threat are due to human error of negligent for this purpose physical must also
be taken in the same way as the security of the equipment in other to avoid certain disasters
the security must therefore be develop at the level of the information system directory
because it concern all the user of the system.
Definition of concept:
1) MODEL: Models form the basics of the development of IS. It is an abstract and
simplify representation of an entity of the real world in other to describe explain or
predict it .
2) Modelling: It consist in creating a virtual representation of reality in other to
highlight the point of interest . modelling is therefore the act of representing our
concept and the object o f reality. The design phase require method to put in place a
model on which we will rely.
Depending on the nature or size of the project. A modelling method must be chosen and
therefore use as far as we are concern we will interested on the merise method.
II. The merise approach.
II.1 Definitions:
Merise standing for “METHODE DETUDE ET DE REALISATION INFORMATIQUE
POR LES SYSTEMES DENTREPRISE” merise is a methode analysis, structural
design and realization of computer system. Wildly use in French companies it is
base on the separation of data and treatment to be perform in several conceptual
and physical model it goal is to come up with an information system . merise
combine analysis and design with the realization of information system other
word merise allow the realization of a project in an organize and structured way .
the data and the treatment are distinct.
II.2 HISTORY:
a) LIFE CYLCE OR TIME AXISE: A life cycle is a set of stages of development of the
product from its conception (design) to it disappearance or consumption. The
life cycle is the most structuring part of development. It is he who defined the
steps or the method. It is on the time scale that we live to the point of
departure to the operation of the system through it creation maturity and
maintenance . it is the detail of each modelling phase . the life cycle is divided
into three periods in which we find the following step
1) A MASTER PLAN: it is a tool for piloting and constant adjustment of the
evolution of the information system. It is the strategic vision of the
organization . this is where the object is decided . a project must be
registered in the general objective of the companies , because it usually
involve a staff before a long period of time.this is the reason why it is
necessary for an organization even before starting a project to defined it
intention with the middle term (1 to 3 years) it is this medium term action
plans that are called the master plans. It generally include the definition of
the field of study planning of the development of each domain a variation
of material and human resources and implementation of the method.
2) THE PRELIMINARY STUDY: the main purpose of the preliminary studies is
to plan the operation and prepare the coming intervention . it is expected
that it will be in trusted to a person who has the commercial relationship
with the client and who will be charge of coordinating the various parties
involve. The following are taken into accounts :
- Proposal of solution and general evaluation of the needs of a
project degrees and type of automation, the cost, delays and
stages, advantages and constraints. Any technical difficulty will
have to be integrated as well
3) DETAIL STUDY : the detail study aim to complete the description of the
solution once the datail study file has being validated by the project
owner it constitute the specification for the production or maintenance of
the application. In case of modification or changes to the specification
during the development phase of the detail study it is important it is kept
up to date. Here we take into accounts . the complete specification of the
information general design and detail design (model, algorithms, data).
4) THE TECHNICAL STUDY: it is the phase of adaptation of the design to the
selected technical architecture while describing and documenting the
functioning of each unit of the software. It deliverable technical study file .
the preparation of the technical study file start when the design has being
validated by the piloting committee. The objective of a technical study file
are
- Provide a complete a detail information of a software in the target
technical environment of the application.
- predicable performance and application security.
5) REALIZATION OF SOFTWARE : This the operational phase of creating the
information system. It is lead by the project manager in relation with the
project .this phase start with the reception and functional and technical
specifications and end with the completion of the information system .
Here , we write the program (algorithms) set the data base and do the
test and do the test.
6) COMMISSIONING : At this level we make sure that the work is in
conformity with the expectation of the users. And to make sure that in it
installation and it use is carry out correctly .So far as the project manager
know the project he has to developed he is the one in charge of installing.
Commissioning is about installing solutions user training and testing. This
phase this phase result in the user manuals.
7) MAINTENANCE: We have three form of maintenance.
- THE CORRECTIVE MAINTENANCE: Correct errors that was not
detected in previous phases.
- ADAPTIVE MAINTENANCE : Must take care of changing and
adapting the software to appearance of the new constraints.
- PERFECTIVE MAINTENANCE: Aid at optimizing the software
performance
DETAIL STUDY
Technical STUDY
SOFTWARE
REALIZATION
COMMISSIONING
MAINTENACE
THE DECISION CYCLE :
The decision cycle ( in V) represent all the choices that must be maid during the life cycle.
It allow iteration to be performed by making the sequence of steps non sequential the
unique test makes it possible to complete the production step. The inergration test are done
in the design phase and the functional test are done in the analysis phase. At the end of the
preliminary study it may also be decided to stop the project
Manual IS
Need analysis
General Design
Detail Design
Coding
Integration
Installation
Exploitation &
Maintenance
It is represented by a V whose descending branch contain all the stages of the project test
design and the descending branch all the stages of the project testing.
The tip of the V representing the concrete realization of the project
One could thus simply deduce that the two branches (Ascending and descending branch )
are only documentation . Each step in a branch correspond to a step on the other branch.
That is a design step correspond to a test step which is specific to eat. To such an extend. A
step of test can be elaborated as soon the corresponding design phase is completed
independently of the rest of the project.
Need Analysis Exploitation
Specification User manuald
book
Coding
Development
The spiral Life Cycle: the spiral model is model of software development cycle that
take the various stages of the V life cycle by implementing successive version. This cycle
start by proposing a product more and more complete. There spiral cycle put more emphasis
or risk management than the cycle In V. there are four phases in the spiral cycle.
a) DETERMINATION OF OBJECTIVE ALTERNATIVE AND. CONSTRANT
b) RISK ANALYSIS AND EVALUATION OF ALTERNATIVE.
c) DEVELOPMENT AND VERIFICATION OF THE CHOOSEN SOLUTION
d) REVIEW OF RESULT AND VERIFICATION OF THE NEXT CYCLE.
deliverables
Validation test Risk analysis
Need analysis
Integration test
specification
Unit test
Detailed design
Expression of Development
Specification Validation
needs
Deploymemt
The Y cycle :
The Y life cycle is base on the 2TYUP process three branches
- The functional branch
- The technical branch
- The realization branch
Here we must first finish with the functional branch then the technical branch and the result
of the study of the two branches lead us to the realization branch
Capture of functional
Capture of technical needs
needs Technialconstraints
Functional
Constrain
Name of actor
- The external Actor: They are not part of the domain but
they interact with the internal actors of the domain ex
customers suppliers etc, and external actor is represented
by a circle or ellipse with dotted lines.
Information flow : it refers to a transfer of information between two IS actors. It goes from a
source actor (sender) to a goal( receiver) it is represented by an arrow whose orientation
indicate the direction of flow of information. We can identify different categories of flow eg
the physical flow , the financial flow etc, this flow must be explain in the form in the form of
information flow we are only interested in flows that involve at least one internal actor. The
flow can intervein in a determined other that can be noted to facilitate reading this
chronological other is not necessarily cinematics because some flow can be issued at the
same time and have the same other number. A flow can be conditional in the sense it occurs
when a condition is fulfill . in this case we can note this condition in quotation
Internal
actor
CMC:
The CMC represent the actor an the arcs (direction) of communication between the
actors for its constructions .it will be wise to respect the following step.
The first step of this model is to isolate the system by delimitating it. It is therefore
necessary to define a system an the external element (external actor) with which it
exchange information flow. The second step is to split the organization into entities call
internal actors. The last step is the analysis of information flow (ie the definition of the
process.
The scrupulous respect of these steps is essential to build the CMC.
1.4 Formalism of the CMC:
The formalism of these models is base on the base on the understanding of two
diagrams that consist of : the context diagrams and the flow diagram of conceptual
flow model.
a) CONTEXT DIAGRAM: the purpose of the context diagram is to represent the flow
of information between the organization study and the external actors in other
words the context diagram is the schema that represent all the flow exchange
between the system an its partners. It does not take into accounts the detail of
the various internal actors of the organization to consider only the company. The
organization or field of study is represented by a rectangle
Flow_name
Client
flow_3
Internal actor 2
Exercise : At the Cameroun bank cooperation (CBC) the process of managing information of
the bank credit card is as follows. An applicant wishing to obtain a visa card must make a
request to it account manager. The card is not granted if the applicant is not a customer of
the bank. Every day the credit card office receive the demand, identifies, processes, classifies
and forward them to the card management service for verification of the conformity of the
information send by the customers. At the end of the month he is in charge of ensuring that
the list of applicant is send in the international center for banking card (ICBC) for
establishment .
As soon as the bank receive all the card from the center( usually 4 weeks after the request)
the card office send to the customer through it account manager a notice of availability and
a notice of withdrawal of the bank of the annual subscription. The customers then withdraw
his card and sign an acknowledgement if after 2 month the card has not been remove it is
destroy .
Task:
Represent the context diagram and the flow diagram
1) Make card
request
VISA
APPLICANT 1.1) Card rejected
1.2) CAMEROUN BANK COOPERATION(CBC)
4) notifies withdrwal of annual subscription
2) Sebd
applicant
demands
ICBC
3) Delivers
card
1. Send request
Accounts
manger
Applicatant
1.1 card rejected
2. Deposit
demand
3) forward demand
w
Actor Actor Actor Actor
1 2 3 4
Actor 1 / Flow 1 - Flow 2
Actor 2 Flow 3 / - Flow 4
Actor 3 - Flow 5 / -
Actor 4 - Flow 6 Flow 6 /
Exercise :
Draw the flow matrix of the above description
Credit card - - \ 3. -
officer forward
demand
Card - - - \ 4 send
management applicant
demand
ICBC - - - \
5 delivers
card
Flow diagram provide a clear view of the project. It is often through a CMC diagram
that a project with the merise method begins. This model allows a clear definition of the IS
and give a good idea on the companies structure. It business role and the various inter
service articulation.
CONCEPTS:
1) Events : an events is a situation whose appearance triggers one or more action within
the organization. An event translate.
- A choice a decision a request(ex decision to pay an invoice,
choice of a new supplier, arrival of an order t the
commercial service, presentation request to a hotel rom,
notice of payment of a balance etc).
- A change of state in a system ( the arrival of the end of the
month 10 PM etc)
Two type of event are distinguish according to the appearance pattern: external and internal
event.
- External event are event from the exterior of a study IS. The
occur randomly. And external event can only be an input of
an operation never in result as for internal event they are
generated by threat specific to the field of study. An
internal event always appears the first time as result of an
operation.
We can also have the resulting event when they are intended for an external actors
(example customer invoice supplier call bank cheques or time event when it is related to the
duration the period the date ( example delay, end of month, beginning of weak, 10 min etc)
NB: an event is always at he origin of one or more operation or result of one operation.
FORMALISM:
EVENT
NAME
EXAMPLE:
The event “ end of the month “ triggers the pay role operations of the company., the
event out of stock or shortage of stock triggers the replenishment process
A1
A2
.
.
.
.
.
An
THE RESULT:
A result may be a document a message a new state of the IS ( new situation new
data) created by an operation which can itself play the rule of an event an external
result information information sent out of the IS invoice of a customer. An internal
result is the new state of the IS ( e.g order of preparation )
NB: synchronization require the presence of multiple trigger event also the
synchronization symbol is left blank in the case of a single event if all incoming
events are link by the same operator, the operator should be include in the
synchronization symbol in this case to manipulate the event more easily we must
assign an alphabetic code also called SYNCHRO-CODE
Synchro code
1 AND 2
Or
Logical
operator
5) The emission rule: an emission rule makes it possible to decide which result will
trigger according to the event of the operation and defined the condition that
must be fulfill for an event to be issued. The emission rule or condition can be
numerous an emission rule can give rise to several result among this condition or
rule we can have;
(<,>,<=,>=,=,….)
CONCEPT
CONSTRUCTION OF THE CMT
Eliminate organizational element who how where.
Find the trigger event and their timing roles.
Find the synchronization roles
Give the actions in a chronological order
Identify the result and their emission roles.
Event Event
1 2
No Operation - name
ER1 ER 2
Result 1 Result
2
Credit
exercise: card
deman
d
No Treatment Rev
Valid. Non-valid
Protect
Appointment
Demand
3.0 Conception Data Model (CDM). The CDM describe the formal
way the data use by the IS and introduces the notion of entities properties identifiers
association and cardinalities.
3.1 Definition
The CDM is the static representation of the enterprise IS it aim to be represent in a
structure way the data that will be use by the IS . it is also a set of concepts and rule for
defining how to represent information in the computer system. It is base on two main
concepts :
Entites and Association hence its second name entity
relationship model
3.2 CONCEPTS:
Entity:this is concret or abstract object that can be dinstinguist recognize and
characterized by its uniqueness. An entity can be
Attribute or property:
An attribute is a feature that describe an entity or an association. At the entity of
ssocaition level . each attribute has a domain that defines the set of possible values that can
be chosen for its (eg integer string , real, date , Boolean etc) the domain of an attribute
characterizes both the type of data . a domain can be an enumerated list, a numeric range or
alpha numeric string. An attribute cannot be shared by multiple entities or association
Entity-name
Property 1
//
/
/
/
NB:
An attribute is a data item which exclude, calculated or derived data. An entity an its
attribute must be consistence with each other.
The exist three time of properties.
CALCULATED PROPERTIES: They are calculated according to
other properties example the students average.
Student average = note * coef / coef.
CONCATENATE PROPERTY: This are properties compose of
other properties example.
Student name = (First name, Sec name).
ELEMENTARY PROPERTIES: This are properties that are
neither calculated nor compose example first name, last
name, coefficient , sex etc.
Calculated properties must be remove from the CDM to review storage space. Concatenated
properties must also be remove to reduce search time.
Person
SSN
F-Name
S-Name
Sex
ASSOCIATION – name
-Property -1
-Property -2
Association
EXAMPLE:
STUDENT Book
Matricule Bk-nb
-Stud- Fname -Bk- title
Borrow
-Stud S-name Date -Pg -nb
-Stud -Sex
CARDINALITIES :
Cardinalities are pairs of value found between each entity and its related association and
which translate business roles. A cardinality aim to describe the nature of each relationship.
The first number indicate the minimum cardinality the second indicate the maximum
cardinality.
Cardinality
Entity
id
ASSOCIATION – name
-Prop 1 (Min,Max) -Property -1
-Prop 2 -Property -2
NB: the minimum cardinality is always 0 or 1, If 0 meaning that the entity does not
participate in the association and 1 meaning that the entity participate in the association.
The maximum cardinality is always 1 or n, with “n” a positive integer often not specify
numerically due to lack of sufficient knowledge. But in some cases the letter “n” can be
replace by a value. The maximum cardinality of one means that the entity always participate
at most ones and the maximum cardinality “n” it participate at most a certain number of
time. The only cardinalities allow are therefore (0,1), (1,1), (0,N),(1,N).
ASSociation between entites
Entity-A
Entity-B
id (0,N)
-Prop 1 ASSOCIATION – name Prop-id
-Property -1 (0,N) -Prop A
-Prop 2
-Property -2 -Prop B
-Prop n
-prop-z
Min,Max cardinalities
id
-F name
-L name
Give-birth
Entity-A
Id-person Company
(0,1) Company-
-Prop 1 Work
-Prop 2
(1,N) name
-Prop A
-Prop n
-Prop B
-prop-z
3. Tertiary association : Its is an association that links three entities
Entity-2
Entity-1 (0,n) Id-person
Id-person (0,n) -Prop 3
-Prop 1 -Prop 5
-Prop 5
Association
(0,n)
Entity-3
Id-person
-Prop 2
-Prop 5
-
Tertiary Association:
Invoices
Invoice-id
customer (1,1)
(1,N)
Cust-id
Cust-name
Receives
(1,N)
product
(0,N)
Prod_id contain
Prod_name
The model obtain by this method as shown in the example above are shown in the optimal
representation and it will be necessary to apply a validation and standardization phase
( elimination of situation that induce redundancy) to lead to a satisfactory solution.
B. Analysis or indirect modelling: here certain steps must be respected but for the sake of
comprehension we will summarize them in five funder mental steps .
DATA DICTIONARY
In the case where the information does not have a dependency then the
information depend functional on it self.
To find functional dependencies the trick is to find the identifier or key. To
create this matrix, we will only dill with elementary data. Coming from the data
dictionary.
METHOD: to complete this table consider each column of data if the is a
dependency between two data we enter the number one and the intersection.
Consider the following data dictionary related to a customers invoice
Sup-nb Art-code
Sup name Descrit
Add-sup Weight-Art
Town-sup Qty-Art
+
Costprice
The sign “+” means that the data sub-nb and art-code need to be link
STEP 3 : DETERMINING ENTITIES HIGHLIGHTING OBJECT OR GROUPING
ATTRIBUE TO IT FEATURES:
To determine the entities one must take into account the graph of functional
dependency.
TASK:
Draw the CDM of the CBC