Page 200 - Software and Systems Requirements Engineering in Practice
P. 200

166   S o f t w a r e   &   S y s t e m s   R e q u i r e m e n t s   E n g i n e e r i n g :   I n   P r a c t i c e


                             Field  Virtual Field  Access  Alarm  Monitoring  Public Safety
                            System  System  Control  Database  Subsystem  Client  System
                       par Analyze Data
                               1: Transmit
                                data()  2: Process data()
                                       3: Store data()
                                              4: Store data()

                                                5: Request data()
                                               6: Request data()
                                                7: Data
                                                      8: Data
                                                            9: Analyze data()
                                                            10 [alarm detected]: Create notification()
                                                             11: Notify()
                                                                     12 [threat]:
                                                                     Notify()
                      FIGURE 5.9  Execution snapshot of the building automation system showing
                      message flow across communicating hardware and software elements

                         Figure 5.10 shows the execution graph for the building automation
                      system corresponding to the scenario in Figure 5.9. Each data sample
                      from the different field systems is first collected by the virtual field
                      subsystem.  On  the  virtual  field  subsystem,  data  from  all  the  field
                      systems within a building is stored into a database and made available
                      for analysis by the alarm subsystem. If an alarm is detected, the alarm
                      subsystem generates a notification for necessary action.


                                        Each sample

                                 Collect
                                  Data


                                        Each building


                                  Store
                                  Data

                                                       KEY
                                        Each field system
                                                            Functional Block
                                                            Repetition Node
                                 Analyze
                                  Data                      Control Flow

                      FIGURE 5.10  Execution graph for alarm detection
   195   196   197   198   199   200   201   202   203   204   205