Software Design Assignment
Software Design Assignment
Dashboard
> <<
e> inc
lud lud
inc e>
<< >
e>>
<<
clud
inc
lud
<<in
e>
>
Verify username
Verify email
and password
Creating, editing,
updating, or
deleting tasks
>
e>
lud
inc
<<
Centralized User
Managing user
and Task <<include>>
profiles
Management
<<
ex
ten
d>
>
Overseeing the
assignment and
completion of
tasks
Admin
user
Centralized and
Structured
Database
>
e>
Ensure Data
lud
inc
Integrity
<<
>
e>
lud
inc
<<
Database
<<include>> Efficient Queries
Management
<<
ex
ten
d>
>
Backup Options to
<<
Prevent Data Loss
ex
te
nd
>>
Smooth Operation
with Large Data
Volumes
Security
>> <<include
<<include >>
<<include>>
Two-step
Data encryption
verification
Role-based
access control
Improved
Efficiency
Scalability
WorkForce Diagram
Represents a general user in the
system who can log in, view tasks,
and manage their profile.
Represents the system’s database,
handling data storage and retrieval.
Attributes:
TASK
DATABASE ER diagrams show the connections
taskID: String
between multiple people, objects,
title: String
connectionStatus: Boolean
backupOptions: String
or ideas
description: Stringunder a single system.
Represents a task assigned to a
status: String user by the admin
assignedTo: User
queryDatabase(): void
dueDate: Date
backupData(): void
ensureDataIntegrity(): void
updateStatus():
USER
voidassignUser(): void
deleteTask(): void
username: String
email: String
password: String
profilePhoto: String
points: Integer
DASHBOARD SECURITY
ADMIN EMPLOYEE
o If required fields for a tas k (title or due date) are mis s ing,
the s ys tem prompts the admin to complete the
informatio n.
SPECIAL REQUIREMENTS
Includes
Workforce Management
Use case
Prepared by: Hussein Ali
Use Case: Centralized User and
Task Management
Includes Extends
1. Creating, Editing, Updating, or Deleting 1. Overseeing the Assignment and
Tasks: Essential for task lifecycle Completion of Tasks: Provides
management. additional supervision and
2. Managing User Profiles: Ensures user tracking of task progress and
data is current and accurate. completion.
3. Verify Email: Validates user email
addresses during profile management.
Thank You!
WORKFORCE
MANAGMENT:
DATABASE
MANAGEMENT
USE CASE
ACTORS
ADMIN: MONITORS AND MANAGES THE DATABASE, TASKS, BACKUPS, AND QUERIES.
USER (EMPLOYEE): INDIRECTLY INTERACTS WITH THE DATABASE THROUGH TASKS AND PROFILE MANAGEMENT.
POST-CONDITIONS:
DATABASE OVERLOAD: HANDLING HIGH-TRAFFIC SCENARIOS BY QUEUING QUERIES TO PREVENT SYSTEM OVERLOAD.
SPECIAL REQUIREMENTS
HIGH AVAILABILITY: ENSURING THE DATABASE IS AVAILABLE 24/7 WITH MINIMAL DOWNTIME.
DATA INTEGRITY: VALIDATION AND CONSTRAINTS TO KEEP THE DATA CONSISTENT AND ACCURATE.
CENTRALIZED AND STRUCTURED DATABASE: ENSURES A UNIFIED AND WELL-ORGANIZED STORAGE SYSTEM FOR ALL USER
ENSURE DATA INTEGRITY: VALIDATES INPUTS AND ENFORCES CONSTRAINTS TO MAINTAIN ACCURATE AND RELIABLE DATA.
EFFICIENT QUERIES: OPTIMIZES DATA RETRIEVAL FOR SMOOTH AND FAST OPERATIONS.
EXTEND:
BACKUP OPTIONS TO PREVENT DATA LOSS: ENHANCES THE SYSTEM BY CREATING REGULAR BACKUPS TO PROTECT AGAINST
SMOOTH OPERATION WITH LARGE DATA VOLUMES: EXTENDS THE FUNCTIONALITY TO ENSURE EFFICIENT PERFORMANCE AND
Post-Conditions: :
• Role-Based Access Control.
• Retention of Points and Tasks on logout.
Flow Of Events: Basic Flow
Yes Authentication Yes
Start Does the user have Access Granted
successful?
permission?
No Access Denied No
Admin/User
Data Encryption Data Encryption
Dashboard
End
Firewall Firewall
Unexpected Breach
Flow Of Events: Alternative Flow
If the user is attempting access with invalid credentials the system should display an error
message.
If the user’s email is not from the company domain (e.g., @company.com), deny access
immediately.
If MFA fails (e.g., the user fails to provide the correct second factor), show an error: "Invalid
authentication code. Please check your device or request a new code.
If the user’s role is not authorized to access the requested dashboard (e.g., admin features),
they should see a message like: "You do not have permission to access this area. Please
contact your administrator.“
If the firewall detects malicious traffic or an unauthorized attempt to breach the system, it
will block the access attempt.
Special Requirements:
• Intrusion Detection and Prevention Systems.
• Data integrity: Hashing
• Firewall Systems.
r c e M an agem en t
Workfo
Scalabilit y U se C as e
nted by Abdulwahab
Prese
Thamer
Actor
Admin: Oversees system scalability measures and resource management.
Pre-conditions Post-conditions
01 02 03
Monitor System Load: Identify Scalability Requirements: Allocate Additional Resources:
- Admin reviews system - Admin determines the need for - Admin configures or
load metrics such as user scalability adjustments based on activates additional resources
activity, task processing observed system load and resource (e.g., more servers, database
times, and server resource utilization. capacity).
utilization.
Flow of Events
Alternative Flows
01 02
Scalability Configuration Errors: Insufficient Resources:
- If the system encounters errors - If additional resources are unavailable,
during resource allocation, the the admin prioritizes critical tasks to
admin is alerted with error logs. reduce load temporarily.
- Admin corrects configuration - Admin requests additional
settings and retries the operation. infrastructure or service upgrades to meet
scalability needs.
Special
Requirements
Monitoring tools must provide real-time system load analytics
Testing tools must simulate high user traffic and data loads to validate
scalability.
Thank You
Workforce Management
Improved Efficiency use case
Prepared by : Abdul Mohsen Abdul Razzaq
Key Aspects
Before After
The workforce management With the new system, task
process was slow, manual, management is faster, more
and prone to errors and transparent, and efficient. It
inefficiencies. improves communication,
accountability.
Thanks !