Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

Agenda:

• SDLC Models

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


SDLC Models:

• An SDLC model explains how various development


activities will be carried out in implementing software.

• These SDLC models are categorized into 2 ways.


 Sequential Models

 Iterative Models

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


SDLC Models:

• Sequential models: Sequential models are best suitable


for small size of applications where all SDLC activities
implemented one after another for the entire application.

• Iterative models: These models are suitable for


implementing big applications where a project will be
divided into modules then, all SDLC activities will be
carried out module by module.

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


SDLC Models:

SDLC Models

Sequential Models Iterative Models

Waterfall Model RAD Model

V- Model Spiral Model

Prototype Model

Agile-Scrum

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


Waterfall Model:

User Requirements

System Requirements

High Level design

Low Level design

Coding

Testing

Deploy

Maintenance

www.talentsprint.com DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL 5


Waterfall Model:

• It is a very earlier approach of implementing the software.

• This model is best suitable for small of applications where


the requirements are very clear.

• In this model all SDLC activities will be carried out one after
another for the entire application.

• As the size of the application is small and also as the


requirements are very clear, we conduct only validation.

www.talentsprint.com DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL 6


Waterfall Model:

Drawbacks:

 Time consuming Model.

 Request changes not possible.

www.talentsprint.com DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL 7


The ‘V’ Model

Customer User Acceptance Test Plan Acceptance


Requirements Testing

System System Test Plan System


Specifications Testing
Integration
High Level Test Plan Integration
Design Testing
Unit Test Plan
Low Level Unit
Design Testing

Coding
V-Model:

• V- Model is introduced to eliminate the drawbacks in


waterfall model.

• In V- model testing is associated at each stage of product


development to find defects as soon as possible.

• In V-model V-stands for Verification & Validation.

• Hence the verification process will be carried out through


the help of Reviews & Inspections.

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


V-Model:

• Where as Validation process will be carried out through


WBT, BBT, GBT.

• This model can also be called as parallel model as all SDLC


activities will be carried out parallel.

Advantages:

 Less Time consuming Model.

 Request changes are accepted.

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


RAD Model:

Project

Module1 Module2 Module3


R A R
P O P
D D D
C C C
T T T

www.talentsprint.com DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL 11


RAD Model:

• This model is preferred, if there is a short time for


implementing a project.

• In this model a big project will be divided into modules then,


every module will be considered as a mini project then
separate teams will be scheduled for every module
implementation.

• These teams take care of implementing their modules


simultaneously.

www.talentsprint.com DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL 12


RAD Model:

• Once all modules are implemented, all these modules will be


combined together then, application will be delivered to
customer in a single release.

• For each module implementation, we can consider either


waterfall model or v-model based on the clarity of the
functional requirements.

• As the application is getting implemented so quickly, this


model called as RAD model.

www.talentsprint.com DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL 13


Spiral Model:

www.talentsprint.com DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL 14


Spiral Model:

• Spiral model is best suitable for maintenance project.

• In this model at first a basic system will be implemented and


deliver to the customer.

• During project maintenance the new functionalities requested by


customer will be implemented one by one.

• Whenever a new functionality is added or an existing functionality


is modified as all core functionalities in the system need to be re-
tested.

• Automation testing is best suitable to speed up the testing process.

www.talentsprint.com DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL 15


Prototype Model:
Change request
User requirements verify

Develop prototype Prepare SRS


verify verify

HLD
verify

LLD
verify

CODE
verify

Testing

Delivery

www.talentsprint.com DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL 16


Prototype Model:

• This model is preferred when the customer requirements are not clear.

• In this model based on the information gathered from the customer, at


first a dummy application will be implements (prototype) then, the
same will be demonstrated to the customer to get the approval.

• Once the customer approved the prototype based on the approved


prototype system requirements will be prepared and reviewed.

• Once the system requirements are reviewed and approved based on


these system requirements all remaining SDLC activities will be carried
out.

www.talentsprint.com DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL 17


Agile-Scrum Methodology:

• Customer satisfaction throughout the -development -production


process.

• It relies on the incremental model i.e., upgrades.

• Upgrades can therefore be more easily integrated using V-cycle.

• Correction demands to be implemented (backlog).

• It involves frequent deliveries, usually every four weeks.

• Hence client receives a perfectly operational application that


includes more and more features every time.

www.talentsprint.com DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL 18


Agile-Scrum Methodology:

Agile-Scrum Team:

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


Agile – Scrum Methodology:

• This methodology involves the following three main


players :

• Product owner: In most projects, the product owner is the


leader of the client's project team. He is the one who will
define and prioritize the product features and choose the
date and content of each sprint based on values
(workloads) that the team communicates to him.

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


Agile – Scrum Methodology:
• Scrum Master: He is a genuine facilitator on the project as
he makes sure that everyone works at their full potential
by eliminating impediments and protecting the team from
exterior interferences. Moreover, he pays particular
attention to the respect of the different SCRUM phases.

• Team: A team is typically made up of 4-10 people and


groups together all the IT specialists who are necessary on
a project, i.e. an architect, a designer, a developer, a tester
etc. The team is self-organizing and remains unchanged
during an entire sprint.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Agile-Scrum Methodology:

Agile –Scrum Process:

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


Agile-Scrum Methodology:
• It requires four types of meetings :

• Planning meetings: The entire team gathers to decide on the


features that will make up the following sprint.

• Daily meetings: The entire team meets for approximately 15


minutes every day in order to answer the following three
questions, usually while standing:

• What did I do yesterday?

• What am I going to do today?

• Is there a cumbersome impediment today?

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


Agile-Scrum Methodology:

• Work review meetings: During this meeting, every member


presents what he has done during the sprint. They organize a
demonstration of the new features or a presentation of the
architecture. This is an informal meeting lasting for
approximately 2 hours which is attended by the entire team.

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


Agile-Scrum Methodology:

• Retrospective meetings: At the end of each sprint, the


team analyzes both successful and unsuccessful elements
of their activity. During this meeting lasting between 15
and 30 minutes where everyone is invited and speaks on
their own behalf, a vote of confidence is organized in order
to decide on the improvements to be made.

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


Agile-Scrum Methodology:
Advantages:

 Participatory methods. (Every team member can be


expressed the opinions & Decisions).

 Enhancing communication. (Team can communicate


easily as all together available in a single room).

 Maximizing cooperation: Daily communication


between the client and the Pentalog team enables them
to collaborate more closely.

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


Agile-Scrum Methodology:
Advantages:

 Documentation can be reduced to minimum. ( To save


the history of the decisions taken on the project).

 To gain more productivity. (Production).

 Iterative and incremental methods. (Frequent Releases).

 Maximum adaptability for product and application


developments. (Add/Modify).

DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL


Question and Answer

28

You might also like