EIDE System Requirements and Specification Documents

Slides:



Advertisements
Similar presentations
EIDE System Requirements and Specification Documents
Advertisements

WORKSHOP SLA SPECIFICATION BY ETIENNE WERY Lawyer at the Paris & Brussels Bar, Partner ULYS IT OUTSOURCING SUMMIT 27/11/2003.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Systems Analysis I Data Flow Diagrams
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
1 Enabling Secure Internet Access with ISA Server.
Introduction to Computer Technology
Cisco PIX 515E Firewall. Overview What a PIX Firewall can do Adaptive Security Algorithm Address Translation Cut-Through Proxy Access Control Network.
Introduction to Information System Development.
SEC835 Database and Web application security Information Security Architecture.
Pre-Project Activities Text Chapters 5 and 6. Pre-Project Activities 1.Contract Review 2.Development Plan 3.Quality Plan.
INFORMATION SYSTEM APPLICATIONS System Development Life Cycle.
Typical Software Documents with an emphasis on writing proposals.
CSI315 Web Applications and Technology Overview of Systems Development (342)
Managing the development and purchase of information systems (Part 1)
ITEC224 Database Programming
9/14/2012ISC329 Isabelle Bichindaritz1 Database System Life Cycle.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
Implementation Options and Project Management WECC DEWG EIDE Workshop.
Chapter 7 Applying UML and Patterns Craig Larman
Control Systems Design Part: FS Slovak University of Technology Faculty of Material Science and Technology in Trnava 2007.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Implementation of EIDE Gateway using ACES Callouts WECC DEWG EIDE Training.
Chapter 9 & 10 Database Planning, Design and Administration Database Application Lifecycle DBMS Selection Database Administration.
CISB113 Fundamentals of Information Systems IS Development.
Software Engineering Saeed Akhtar The University of Lahore.
Chapter 12 The Network Development Life Cycle
EIDE Architecture Overview WECC DEWG. Soap Methods  EIDE provides a “Put” method for data –Sender transfers schedule data, meter data, text message,
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
CS457 Introduction to Information Security Systems
Architecture Review 10/11/2004
Review of IT General Controls
Chapter 1 The Systems Development Environment
Business System Development
Chapter 1 The Systems Development Environment
System Design, Implementation and Review
Information Systems Development
Fundamentals of Information Systems, Sixth Edition
Chapter 1: Introduction
Chapter 1 The Systems Development Environment
IEEE Std 1074: Standard for Software Lifecycle
EIN 6133 Enterprise Engineering
Chapter 1 The Systems Development Environment
Introduction to Networking
Description of Revision
System Requirements Specification
Chapter 1 The Systems Development Environment
IS4550 Security Policies and Implementation
Chapter 3: Open Systems Interconnection (OSI) Model
Design Unit 26 Design a small or home office network
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
INFORMATION SYSTEMS PLAN
HIPAA Security Standards Final Rule
Implementation of EIDE Gateway using ACES Callouts
MANAGING THE DEVELOPMENT AND PURCHASE OF INFORMATION SYSTEMS
AbbottLink™ - IP Address Overview
Implementation Options and Project Management
EIDE Architecture Overview
Chapter 1: Introduction
Chapter 1: Introduction
Chapter 1: Introduction
IT OPERATIONS Session 7.
Today’s Agenda Dealing with Vendors Consultants Contracts
Software Testing Lifecycle Practice
Information Systems Development (ISD) Systems Development Life Cycle
Chapter 1 The Systems Development Environment
Chapter 1: Introduction
Presentation transcript:

EIDE System Requirements and Specification Documents WECC DEWG EIDE Training

Overview What you will need to specify Identifying deliverables Specification boilerplate

What you will need to specify Network infrastructure Security Back office interfaces Data mapping Triggers Error conditions Redundancy

Network infrastructure How can you use your existing network infrastructure to meet your security and functionality requirements? Possibilities include: Smart listener with code and access to back office through secure sockets or ports Dumb listener with ability only to write documents Somewhere in between

Security requirements Any design you create must meet your security requirements and should be reviewed by the 1300 compliance monitor. Firewall policy DMZ policy Authentication policy This is not because the interface is necessarily critical, it is because of the interface to the potentially critical systems. Firewall – are ports allowed to be opened inbound, is anything outbound restricted? DMZ – can systems be placed in the DMZ Authentication policy, does it allow client mapping?

Back office interfaces Which systems will you be getting data from and sending data to? How? Database, file, three tier? Can changes to the back office systems be isolated from the gateway? What methods will be implemented? How will you ensure reliability?

Data Mapping How will you flexibly map data between your system and others? EIDE protocol is flexible and allows various methods. Database structure and programming logic can allow any combination. Hierarchical approach can be used.

Triggers Timed transfers? Who sets these up and how? Manual transfers? What does the user interface look like? Will you do gets?

Error conditions What happens when you get an invalid inbound document? What happens when your database is temporarily down? What happens when you can’t find a path for a file write? What happens when the receiver system is down? How are timeouts and bad responses handled? Do you need acknowledgement? How are bad responses handled? Do you need acknowledgement?

Redundancy Dual internet connections through different vendors No single point of failure Hot standby configurations Parallel configurations Failover between database sessions

Identify Deliverables Based on what tasks are to be performed Assign responsibilities Specification documents can be created for each module with interfaces specified in each Deliverables may include: System Requirements Document, System Design Document, Database Design, Detailed Design, Technical Documentation, User Documentation, Data Dictionary or Glossary, RFP, Statement of Work Sys req contains a specification of functions defines “what”, sys design contains high level data flows and defines “how”, detailed design contains specifics of how, including physical design details.

Specification boilerplate Introduction including project scope, specification overview, and description of existing systems Functional Requirements with subsections for each functional area User interface requirements Hardware and software requirements Sizing, expansion, performance, upgrade, testing Documentation and Training Maintenance

Functional Requirements Should specify “what” rather than “how” with exceptions where required Should allow for creative implementations Identify which methods will be required Identify any specific implementation requirements for back office interfaces How 23 and 25 hour day is handled How data is mapped

EIDE requirement examples Data sets containing a combination of EMS and Scheduling information can be configured to trigger each hour at HH:MM, each day at XX:MM, each week at XX:MM Data from EMS and scheduling system can be sent using either PutSchedule or PutMeter Messages received will be displayed at the _______ console in a popup box

EIDE Specification Compliance with schema and communications protocol document Ability to integrate schema modifications Functional requirements include validation of received documents based on your own business rules, back end system interfaces User interface requirements include both administrative and user. Meter data accepted only in the past, schedules only in the future, schedules only 3 days back unless operator override, meters only 3 days back, max number of days to accept into the future

EIDE Spec Functional requirements should also specify data translation requirements, whether gets will be used, etc. Should also include timing requirements if there are any Be sure to include 23 and 25 hour day handling, data compression, error conditions, etc.

RFP and SOW boiler plate Needs to include: Terms and conditions Responsibilities, deliverables, schedule, disclosure, termination, performance, project rights, agreement on definition and handling of work outside scope, invoicing and payments, software license/ownership,etc. Project organization and procedures Any company specific requirements

Tool choices There are many good tools available for describing the functional requirements These include DFD, UML, relationship charts for database…