All scenarios will be illustrated by the same example. In order to have a general introduction to this, have a look at First introduction to the example .
The relation to the general methodology is given in Scenarios and Methodology .
The scenarios deal both with the overall process (providing the context) and the specific activities which must be performed in order to produce the various models and descriptions. Applications of the guidelines of the various activities will be demonstrated.
In the Process theme a number of development processes are defined. The scenarios are examples of exactly these processes. Each scenario is a project with concrete descriptions and activities.
The material covered here is complementary to the Descriptions theme, which deals with the (static) categories of descriptions and documents covered by TIMe. Here the focus is on the (dynamic) activities that will produce (sequences of) the descriptions.
The Configuration Management theme describes how the very flexibility of software can lead to problems if you don't have a good overview of exactly which variants of which items you have, their different characteristics, the differences between them etc. It discussed various ways of expressing this information, to help maintain a clear picture of the items you have.
However, the Configuration Management theme addresses only the static part of the problem, i.e. representing what variants you actually have, now. It does not say anything about what activities you must carry out in order to develop new variants.
We propose an overall software development process. It shows the main activities that should take place as a product evolves, and is constructed in such a way as to support flexible adaptation, configuration and re-use. The process is described in prose and in diagrammatic form.
So: the role of the development process is to provide an essential context for organising the day to day activities of systems engineers. Its impact on their day to day work is to show how completion of a specific activity relates to other activities and, ultimately, to an effective way of producing new system instances.
System engineers who really use a methodology want to do so on a more or less day to day basis; they want something that tells them how to proceed under various different circumstances. While the development process gives a context, it does not answer this more immediate need.
For this reason, we also include a number of scenarios illustrating how the process works in various situations that the software developing organization must tackle. Each scenario is described in terms of:
The purpose of the Access Control System is to control the access to some service (i.e. entrance through a door into a zone) open only to trusted people with known identity. Ideally, users should be recognised by the system and granted or denied access depending on some unique physical attribute.
Each card holds a unique Card-code that identifies the card. To grant access the system will read the Card-code and then check the corresponding access right. For additional authentication, the user may be asked to enter the secret personal number (PIN).
The card is a plastic card with a magnetic strip holding a card code and possibly an encrypted PIN code. The encrypted PIN will not be used in our system initially. At a later stage it may be used for local authentication in the Local Stations. The physical appearance of the panel and the card is shown in Figure 2 . Each panel represents an Access Point.
The main service demanded by the user is to gain access when the card is presented to the system. But access should only be given to authorised users. Hence, a user will be rejected if an attempt is made to enter at an access point where the user is not authorised to pass.
A typical access control system will consist of a number of access points and a central unit where validation is performed. Some access points are so-called blocking access points, that is access points that may be blocked by an operator, so that access is denied even with a valid card and code, until the access point is enabled again. Other access points may have the property that they log what is going on at the point.