Skip to main content

Application Design Diagramming Techniques-Part-I

This and few other subsequent posts will explore the diagrams used in designing the application in developing the Logical model for application.

This post explores the ORM(Object Role Modelling)

 Object Role Modeling (ORM):

An ORM diagram includes the primary objects (also called entities) in the system, the relationships between those objects, and the attributes (and even attribute values) that define those objects. ORM notation is used to create this logical representation between objects.

 ORM Objects

In ORM diagrams, each object is represented by an oval containing the name of that object.

Simple rule to identify ORM objects: Any nouns in the requirements or use case is an ORM object

ORM Relationship

An ORM relationship defines how two or more objects are related to one another. In an ORM, a relationship between objects is represented as a line connecting the objects. Along this line will be a rectangle divided into segments based on the number of objects in the relationship. This is typically two segments because most often, you are modeling relationships between two objects (called a binary relationship). However, if you are modeling a relationship that exists among three objects (called a ternary relationship); all three relationships need to be defined


Project and developer has a binary relationship. A developer can be assigned to a Project.

Ternary relationship exists between Release, manager and developer. A release consists of efforts from developer(s) and manager.

 ORM Facts

A fact indicates how two (or more) items are related. This is also called the fact model for the application. They represent how objects really relate to one another.



The Facts depicted in figure can be read as;

A project has developer and in reverse Developer is in Project

For Ternary relation Developer and Project manager makes a release and reversely a Release has a manager and developer(s).

Similarly, a Manager has Employee details and Employee Details is of manager.

An employee detail has a Name, EmployeeID and Designation and Designation, EmployeeID and Name is of Employee details (that is a manager).

ORM Constraints

ORM constraints define how the objects participate in the relationship. This includes defining which objects are mandatory and the multiplicity of the relationship. Mandatory objects in a relationship are indicated by a closed (or filled) circle attached to either end of the connection. This closed circle indicates that the given object is mandatory in the relationship. That is, the related object does not exist without this object.

Multiplicity indicates whether two objects relate to one another as one-to-one, one-to-many, or many-to-many. Multiplicity is indicated with a series of arrows over the relationship shape.

In the Above figures, the objects are mandatory; however No Color has been used for Filling.

The Figure below depicts the Multiplicity notation(s).

 Try to put these constraints in the Figure-1 or Figure-2 to get the complete picture of ORM diagram. This has been left intentionally as a practice to the reader.

 Note: ORM diagrams, as a myth are thought to be used in Database diagramming only, however it serves as an excellent tool for initial designing phase(s).

The next few post will cover the other diagramming techniques that include component diagram, class diagram, activity diagram, Sequence diagram, collaboration diagrams.

Hope this article was helpful….

Till Next we connect…….

Happy Learning.



Try to put these constraints in the Figure-1 or Figure-2 to get the complete picture of ORM diagram. This has been left intentionally as a practice to the reader.

Note: ORM diagrams, as a myth are thought to be used in Database diagramming only, however it serves as an excellent tool for initial designing phase(s).

The next few post will cover the other diagramming techniques that include component diagram, class diagram, activity diagram, Sequence diagram, collaboration diagrams.

Hope this article was helpful….

Till Next we connect…….

Happy Learning.

Comments

Popular posts from this blog

Asp.Net 4.0: An Overview-Part-III

This is the last post in the series which will explore the following new features of ASP.Net 4.0  Performance Monitoring for Individual Applications in a Single Worker Process Web.config File Refactoring Permanently Redirecting a Page Expanding the Range of Allowable URLs Performance Monitoring for Individual Applications in a Single Worker Process It is a common practice to host multiple ASP.NET applications in a single worker process, In order to increase the number of Web sites that can be hosted on a single server. This practice results in difficulties for server administrators to identify an individual application that is experiencing problems. ASP.NET 4 introduces new resource-monitoring functionality introduced by the CLR. To enable this functionality, following XML configuration snippet is added to the aspnet.config configuration file.(This file is located in the directory where the .NET Framework is installed ) <?xml version="1.0" encoding="UTF-8"

SOLID principles -Code Samples and Free Ebook

I planned to write code samples for SOLID principle implementations, however I am a firm believer of " NOT RE-INVENTING THE WHEEL ", when all you need is use the wheels and make a new CAR. Going by the ideology, I have found an excellent  SOLID principles FREE -Ebook ( covering all aspects of SOLID design principles, with Code sample). This book is an excellent visual aid to remember these principles, as it uses Motivational posters for explaining SOLID design principles. One additional advantage to the above mentioned book is the Code-Refactoring ebook . Both of these books can be downloaded from this EBOOK download Link Both of these books can be downloaded form here. Hope this book proves useful... Till next we connect.... Happy Learning..

Authentication using Social Networking portals(Facebook, Gmail, and Yahoo)

There are tons of sites, which offer sign on using the social networking site credentials (Facebook, gtalk, twitter and the list continues).It can be termed a “SINGLE SIGNON” and offers a lot of benefits compared to traditional database authentication approach. However, not storing user credentials in the DB imposes an additional risk. How to track who all logged into the system. Now the question is, which approach to follow. The best approach is to use inbuilt asp.net users for storing the logging info about user activities and using single signon technique for authentication. This article will explore the approach and provide the details of implementation using some third party libraries and customizing it to the requirements. The Authentication will be done using the following networking portals Yahoo  Gmail Facebook    Special thanks to my friend Sumit Khandelwal, for implementation of Facebook part (in fact he did it all!!) Except Facebook, all other can be authentic