Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

OOAD CASE STUDIES FROM UNIT 1 TO UNIT 5

1. Case Study: System Architecture: Satellite-Based


Navigation:

Here, WE approach the development of the system architecture for


the hypothetical SatelliteNavigation System (SNS) by logically
partitioning the required functionality.

Requirements for the Satellite Navigation System


Vision:
 Provide effective and affordable Satellite Navigation System
services for our customers.Functional requirements:
 Provide SNS services
 Operate the SNS
 Maintain the SNS
Nonfunctional requirements:
Level of reliability to ensure adequate service guarantees
Sufficient accuracy to support current and future user needs
Functional redundancy in critical system capabilities
Extensive automation to minimize operational costs
Easily maintained to minimize maintenance costs
Extensible to support enhancement of system functionality
Long service life, especially for space-based elements
Defining the Boundaries of the Problem
2. Case Study: Control System: Traffic Management
The document describes a traffic management system with the following
key elements: Sensors detect traffic density and report it to a central
control room. The control room sends signal times to coordinate traffic
flow. In emergencies, sensors notify the control room which contacts
local hospitals. Alternative routes are displayed on message boards.
Speeding vehicles are reported to downstream police. Traffic data is
logged to analyze road usage.
Mission Statement:
Government wishes to automate traffic management system: there are sensors
at each traffic signal. Each sensor senses the traffic densityand reports
it to central control room. The control room sends signals (green signal
and waiting time). All the signals follow a pattern for
ON and OFF like when one signal is GREEN then opposite direction signalis
RED and vice versa.
In case of accident, sensor sends signal to the control room, traffic at that time is
regulated accordingly. Nearest hospital is contacted and is asked to
report immediately. In case of rally and processions and road maintenance,
alternative ways/roads are flashed on the Flash Boards. During normal
conditions boards display traffic status of nearby areas where the
corresponding road leads. In case someone breaks the signal or exceeds
speed limit vehicle number and the direction in which it is going is noted.
The
trafficpolicea t t h e n e x t c o r r e s p o n d i n g s i g n a l a r e i n f o
r m e d a b o u t i t s o t h a t appropriate action can be taken.
3. Case Study: AI: Cryptanalysis:
4. Thanks to the profusion of cybercriminals, cybersecurity professionals must
have an extensive toolbox filled with everything needed to keep data,
networks, and systems safe. But unfortunately, some of those same tools can
be used by cybercriminals to wreak havoc on systems and commit
cybercrimes.
5. But no matter which side of the law anyone falls on, it's true that there's a
dizzying number of tools, techniques, and resources available
in cybersecurity. So in our ongoing effort to inform and demystify these tools,
we focus today on cryptanalysis.
6. This article defines cryptanalysis, identifies its users, and explores
cryptanalysis attacks and techniques. We will also look at some cryptanalysis
tools and the different forms of cryptanalysis.
7. Let’s kick things off with the question, “What is cryptanalysis?”
8. What Is Cryptanalysis?
9. Cryptanalysis is the study and process of analyzing and decrypting ciphers, codes, and
encrypted text without using the real key. Alternately, we can say it’s the technique of
accessing a communication’s plain text content when you don’t have access to the
decryption key.
10. Put simply, cryptanalysis is the practice, science, or art of decrypting encrypted
messages.
11. Cryptanalysis experts study ciphers, cryptosystems, and ciphertext to understand their
functions. Then, they use that knowledge to find or improve techniques to weaken or
defeat them. However, as we're about to see, it can be used for good or nefarious
purposes.
12. So, a cryptographer is someone who writes encryption code used in cybersecurity,
while a cryptoanalyst is someone who tries to crack those encryption codes. Two
opposing sides of the cybersecurity coin, locked in conflict, trying to one-up the other,
constantly inventing new measures and countermeasures. This rivalry drives the
innovation found in the cybersecurity field.
13. Web Application: Vacation Tracking System
14. Case Study: Weather Forecasting:
Weather Forecasting Application is one of the most common mini
project in Software Development .
we are going to make a Weather Forecasting Application from
scratch which will tell us the weather of any location using its name .
Weather forecasting is a challenging area. To protect life and property weather
warnings is important forecast.

You might also like