System and Software Architecture Description (SSAD)Version HistoryTable of ContentsTable of TablesTable of FiguresA.1. IntroductionA.1.1 Purpose of the SSADA.1.2 Status of the SSADA.2. System AnalysisA.2.1 System Analysis OverviewThe purpose of the Improving Thai CDC: Client/Donor/Partner Communications and Project Tracking Tool are to unify the contact list of each individual staff in Thai CDC and to provide a tool to monitor projects in Thai CDC. The Client/Donor/Partner Communications and Project Tracking Tool will provide a centralized database to manage contact information including contacts' names, addresses, donations and other information (as deemed fit by Thai CDC). The system will provide methods that add, edit, and delete contacts' information in a centralized cloud-based database. The system will also record information about each internal Thai CDC sponsored project, and it will provide tools to view the information about said projects..2.1.1 System Context.2.1.2 Artifacts & Information.2.1.3 BehaviorA.2.1.3.1 Contacts managementA.2.1.3.1.1 LoginA.2.1.3.1.2 LogoutA.2.1.3.1.3 Change passwordA.2.1.3.1.4 View contacts informationA.2.1.3.1.5 Add contactsA.2.1.3.1.6 Delete contactsA.2.1.3.1.7 Edit contacts informationA.2.1.3.1.8 Mass mailA.2.1.3.1.9 Create newsletter formatA.2.1.3.1.10 Add projectA.2.1.3.1.11 Delete projectA.2.1.3.1.12 View project informationA.2.1.3.1.13 Edit project informationA.2.1.3.1.14 View donation informationA.2.1.3.1.15 Add donationA.2.1.3.1.16 Add userA.2.1.3.1.17 Delete userA.2.1.3.1.18 Edit user informationA.2.1.3.1.19 Edit donationA.2.1.3.1.20 Delete donationA.2.1.3.1.21 Back up dataA.2.1.3.1.22 Filter donationA.2.1.3.1.23 Filter projectA.2.1.3.1.24 Filter contactsA.3. NDI/NCS Interoperability AnalysisA.3.1 IntroductionB. COTS / GOTS / ROTS / Open Source / NCS3.3 Connectors3.4 Legacy SystemC. System StructureC.1.1 Evaluation SummarySystem and Software ArchitectureDescription (SSAD)Improving Thai CDCEstablishing a New Client/Donor/PartnerCommunications & Project Tracking ToolTeam #: 01Team Members & RolesName Primary/Secondary RoleBrandon Foster IIV & V/Quality Focal PointDing Li Life Cycle Planner/Software ArchitectYi Li Feasibility Analyst/Requirements EngineerIno Mantaring Requirements Engineer/PrototyperVishal Punjabi Operational Concept Engineer/PrototyperKatelyn Swift-Spong Manager/Operational Concept Engineer12/05/2011System and Software Architecture Description (SSAD) Version.: 3.1Version HistoryDate Author Version Changes made Rationale10/10/2011 Ding Li 1.0- First version of SSAD, add description about purpose of SSAD and analysis of proposed system- To analyze proposed system, identify context, artifact and behavior of proposed system. 10/14/2011 Ding Li 1.1- Updated UML model and fixed errors - For Draft FCP10/24/2011 Ding Li 2.0- Updated UMLs and fixed bugs.Interoperability of NDIs is analyzed- For Draft DCP11/21/2011 Ding Li 3.0- Bugs fixed, UML updated, deployment diagram added- Prepare for transition12/05/2011 Ding Li 3.1- Bugs fixed - For TRRSSAD_TRR_F11a_T01_V3.1 Version Date: 12/05/2011iiSystem and Software Architecture Description (SSAD) Version.: 3.1Table of ContentsSystem and Software Architecture Description (SSAD).............................................................iVersion History..............................................................................................................................iiTable of Contents..........................................................................................................................iiiTable of Tables...............................................................................................................................ivTable of Figures............................................................................................................................vii1. Introduction………………………………………………………………………………..12. System Analysis……………………………………………………………………………23. NDI/NCS Interoperability Analysis…………………………………………………….24SSAD_TRR_F11a_T01_V3.1 Version Date: 12/05/2011iiiSystem and Software Architecture Description (SSAD) Version.: 3.1Table of TablesTable 1: Actors Summary................................................................................................................2Table 2: Artifacts and Information Summary..................................................................................3Table 3: Process Description: login................................................................................................4Table 4: Typical Course of Action-login: successfully....................................................................5Table 5: Alternate Course of Action-login: failed...........................................................................5Table 6: Process Description: logout..............................................................................................5Table 7: Typical Course of Action-logout: successfully..................................................................6Table 8: Process Description: change password............................................................................6Table 9: Typical Course of Action-change password: successfully.................................................6Table 10: Alternate Course of Action-change password: failed......................................................6Table 17: Process Description: view contacts information.............................................................7Table 18: Typical Course of Action-view contacts information: success........................................7Table 19: Alternate Course of Action-view contacts information: failed........................................7Table 20: Process Description: add contact...................................................................................8Table 21: Typical Course of Action-add contact: successful..........................................................8Table 22: Alternate Course of Action-add contact: failed..............................................................8Table 23: Process Description: delete contacts..............................................................................9Table 24: Typical Course of Action-delete contacts: successful.....................................................9Table
View Full Document