Top Banner

of 32

LCMA3

Apr 05, 2018

Download

Documents

sizweh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/2/2019 LCMA3

    1/32

    APPENDIX 3

    INTRODUCTION TO IDEF METHODOLOGY

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-1

    IDEF Methodology - The Department of Defense (DoD), including the Army and its major

    Introduction

    commands, has adopted the IDEF modeling technique for developing thelogical models which describe functional processes and information flows.

    IDEF, which stands for Integrated Computer-Aided Manufacturing

    DEFinition, is a structured and proven methodology widely used

    throughout industry and government. "Modeling" has replaced traditional

    "systems analysis" as a preferred technique for discovering and

    documenting customer requirements. Modeling is faster, less

    cumbersome, and less subject to miscommunication. The initial phases in

    the life cycle management of an information system (e.g., development of

    a Mission Need Statement (MNS), Operational Concept Description

    (OCD), etc.) depend extensively on the Functional Proponent's ability to

    capture a detail description of the "AS-IS" and "TO-BE" worlds. As

    project sophistication and scope increase, the more critical it is that a

    modeling effort be supported through a groupware facility. Groupware

    can considerably reduce staff time required for the modeling process.

    IDEF modeling, whether full scale or in an abbreviated version, provides both the

    methodology and vocabulary for accurately analyzing specific business processes, process

    improvements, information requirements, and system deficiencies.

    IDEF models are graphical and textual representations of activities, and

    the data needed to support those activities. IDEF0 is the technique used

    for modeling activities, and IDEF1X is the technique used for modeling

    data. The explanations in this appendix will aid in reading and

    understanding the graphic diagrams of activity and data models. In

    addition, this appendix describes the analytical process from which IDEF

  • 8/2/2019 LCMA3

    2/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-2

    models will be derived, including a brief discussion of the Structured

    Requirements Analysis Planning (STRAP) process.

    IDEF0 Activity Activity modeling, sometimes called "process modeling," allows both

    Modelingfunctional experts (personnel responsible for executing the business on a

    daily basis) and IM technical staff (information engineers, computer

    programmers, database administrators, etc.) to communicate with each

    other and to effectively capture the activities involved in day-to-day

    business operations.

    The activity models described in this section are called IDEF0 activity

    models. To understand activity models, it is necessary to understand the

    symbols used to represent the activities and the functions that define those

    activities. The diagram in Figure 3-1 is an example of a simple IDEF

    activity model:

  • 8/2/2019 LCMA3

    3/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-3

    Figure 3-1. Basic IDEF Activity Model

    In the above activity model, the central box represents an activity. An

    activity is a process that occurs within the scope of this area of the

    business. The activity shown in the model is SCHEDULE-WORK-

    REQUESTS. (Note that the activity name begins with a verb; all

    activities in an IDEF0 activity model begin with a verb.)

    ICOMS As shown in Figure 3-1, arrows enter and exit the box. These arrowsrepresent products or resources which define the activity. IDEF0 activity

    models utilize four different types of functions. "Inputs," which are

    consumed or transformed by the activity, enter the activity box from the

    left side. "Controls," which constrain or control when or how the

  • 8/2/2019 LCMA3

    4/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-4

    activity is accomplished, enter the activity box from the top. "Outputs,"

    or the products of the activity, exit from the right, and "Mechanisms,"

    the people or tools used to execute the activity, enter from the bottom.

    The arrows in an activity model are known collectively as "ICOMs," an

    acronym derived by taking the first letter of each function. All ICOMs

    are given a label, which helps to describe the function. A glossary

    defining each ICOM and each activity also accompanies the model

    diagrams. Activity names and ICOM labels should be unique throughout

    the model.

    Context The activity previously illustrated in Figure 3-1 represents the simplest

    Diagramsform of an activity model called a "context diagram." Only a single

    activity is shown in a context diagram. Multiple activities are shown in a

    "decomposition diagram." A decomposition diagram represents all the

    subactivities of a larger activity. (It is in this manner that the larger

    activity is said to be "decomposed.") The following example in Figure

    3-2 represents a decomposition diagram.

    Figure 3-2. Sample Decomposition Diagram

  • 8/2/2019 LCMA3

    5/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-5

    ICOMS - Split Note the output ICOM of the activity PROCESS-WORK- REQUESTS in

    and Bundledthe decomposition model in Figure 3-2. This ICOM splits into two

    separate ICOMs, one labeled INAPPROPRIATE-WORK-REQUEST,

    which goes straight to the border, and one labeled VALID-WORK-

    REQUEST, which becomes an input into the next activity,

    SCHEDULE-WORK-REQUESTS. This is known as a split ICOM. The

    branches of a split ICOM must be labeled if they represent only a portion

    of the entire item, as they do below, but need not be labeled if they are

    identical to the originating ICOM. ICOMs can also be grouped, or

    "bundled," together. The same naming conventions that apply to split

    ICOMs also apply to bundled ICOMs.

    IDEF0 - Each activity in an IDEF0 activity model is given an alphanumeric

    Numbering

    Activitiesidentifier. This identifier can be found in the bottom right-hand corner of

    the activity box. In Figure 3-2, "A2.1" appears in the corner of the first

    activity, and "A2.2" appears in the second activity. The "A" stands for

    activity, and the number is of sequential significance to other activity

    models within this business area. This can be illustrated by remembering

    that activities may be decomposed into their component subactivities.

    These subactivities are distinguished from one another by an increasing

    string of decimal identifiers. For example, activity A3 would consist of

    subactivities A3.1, A3.2, A3.3, etc. Activity A3.2, in turn, may consist of

    subactivities A3.2.1, A3.2.2, etc. The highest level activity is called A0.

    Sometimes it is desirable to reduce clutter on a diagram by suppressing an

    ICOM at a level where it is not of particular importance. This is shown

    by adding brackets [ ] to either the head or tail of the ICOM arrow.

    Brackets next to the activity box signify that the ICOM will not be seen on

  • 8/2/2019 LCMA3

    6/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-6

    the next level decomposition of that activity. Brackets next to the border

    end of an ICOM signify that the ICOM is not shown on the parent

    diagram.

    The preceding text provided a briefoverview of the IDEF0 activity

    modeling syntax needed to read or help build an IDEF0 model. If

    participation as a team member on a modeling project is required,

    additional training and practice will be necessary and should be provided.

    In addition, an experienced modeler usually acts as a facilitator on

    modeling projects, assisting team members in using the methodology.

    However, the information provided in this appendix can serve as

    preparation for taking part in model reviews.

    IDEF0 - Model When reviewing models as part of a review board, two things should be

    Reviewkept in mind. First, not all activities, as modeled, apply to every specific

    case in the business area. The IDEF0 models are comprehensive, taking

    into account all possibilities. When applying the model to a specific case,

    nonapplicable activities and arrows should simply be ignored. Secondly,

    the activities in decomposition diagrams are not necessarily in

    chronological order when read from left to right. Due to the iterative and

    repetitive nature of most business activities, one activity might occur

    before another in a certain situation, but won't in a different situation.

    Each activity should, however, depict the interdependence among otheractivities. The ICOMs and their definitions should sufficiently show

    precedence and dependencies so that the reader can meaningfully follow

    the sequence of events.

  • 8/2/2019 LCMA3

    7/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-7

    IDEF Models - Whether building or reviewing models, AIS managers need to be aware of

    Quality Issuesfeatures that represent good modeling technique. Some of these features

    are:

    The number of parent activities in a single decomposition model

    should range between 3 and 6. Less than three suggests that the

    decomposition may not be needed. More than six will tend to make

    the model too busy for clear communication.

    Each subactivity in the decomposition of a parent activity, should be

    of approximately equal importance. Don't mix trivial activities with

    complex ones.

    Verbs in activity names should decompose by changing from the

    general to the specific during the decomposition process. This means

    that the same verb should not appear in the parent and child activities

    of a good decomposition model.

    Activities in the same decomposition diagram should have some

    interconnection of ICOMs. If not, the model may be decomposing an

    organization rather than a business activity.

    Inputs need to undergo some transformation by the activity. If they

    don't, maybe they are actually controls or mechanisms or no activity isreally being performed (i.e., "noise") and such "inputs" are good

    candidates for elimination.

  • 8/2/2019 LCMA3

    8/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-8

    Above all else a good model must communicate. Anything that

    promotes effective communication is good, anything that impedes

    communication is bad.

    IDEF0 Modeling There are a number of software packages available for use in capturing

    Toolsand diagraming IDEF0 models. Most of these packages run on Personal

    Computers (PCs), SUN workstations, or equivalent devices. The USACE

    Data Encyclopedia incorporates the capability to store captured IDEF0

    models. The PM should consult the IM technical staff for specific

    recommendations of the most suitable tool for a specific AIS project.

    IDEF1X - Data Techniques for building IDEF1X data models are presented in this section

    Modelingtogether with an explanation of why modeling is important and how to

    understand a data model. Modeling data allows both functional experts

    (people who perform the activities on a daily basis) and IM technical staff

    (information engineers, computer programmers, database administrators,

    etc.) to communicate with each other and to talk on a "neutral" level. It

    allows a business to capture and store data once and only once, and to

    operate under a consistent set of internal rules. Robust internal rules, in

    turn, ensure availability of a wealth of useable data to support Corps

    missions.

    Modeling data also allows for meaningful insight into the impact of major

    AIS modernization projects on Corps data resources. Finally, modeling

    the data allows discrete business areas the ability to integrate into a larger,

    corporate-wide view of the data.

  • 8/2/2019 LCMA3

    9/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-9

    The data model examples in this section are called IDEF1X data models.

    To understand a data model, it is necessary to understand the symbols

    used to represent characteristics and rules of data in a business. The

    diagram in Figure 3-3 is an example of a simple IDEF data model:

    Figure 3-3. Basic Data Model

    In the data model shown in Figure 3-3, the boxes represent "entities." An

    entity is a set of real-world objects with common characteristics about

    which data is kept. The two entities shown in the model are CUSTOMER

    and WORK-REQUEST. (Note that it is a generally accepted convention

    that entity names are written in all capital letters, and in a multiword

    entity name such as "WORK-REQUEST," each word is separated by ahyphen rather than a space.) Since an entity is a set of real-world objects,

    this requires more than one occurrence of each entity. Each occurrence of

    an entity is called an "instance" of the entity. For example, John E. Smith

  • 8/2/2019 LCMA3

    10/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-10

    (with certain appropriate characteristics) might represent one instance of a

    CUSTOMER. Mary Jones would be another instance.

    Entity Rules There are four rules that determine an acceptable entity for a business data

    model:

    The entity must be a noun (person, place, thing, concept or event).

    There must be multiple instances of the entity.

    Each instance of an entity must be uniquely identifiable.

    The entity must be of interest to the business area being modeled.

    Entity Between the two entities is a line with a dot at one end representing a

    Relationships "relationship." The relationship name, in this case "submits," should help

    to define and restrict the link or connection between the two entities.

    (Note that multiword relationship names are also separated by hyphens

    rather than spaces, but are written in lower case letters.)

    Cardinality The dot at the end of the line represents the "cardinality" of the

    relationship. The cardinality depicts the number of instances of one entity

    per instance of the other. For example, CUSTOMER John E. Smithmight submit many WORK-REQUESTs: one on Tuesday, one on

    Thursday, and a third on Friday. Mary Jones, on the other hand, may

    submit only one WORK-REQUEST. A third customer might not submit

    any. The cardinality between CUSTOMER and WORK-REQUEST

  • 8/2/2019 LCMA3

    11/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-11

    depicted in the example data model allows for all three of the above

    situations to occur. That is, an instance (or occurrence) of CUSTOMER

    may submit either zero, one, or multiple instances of a

    WORK-REQUEST. In this manner, a simple black dot represents a

    cardinality of "zero, one, or many" instances.

    Other cardinalities, some of which are fairly complicated, can also be

    depicted. For example, a black dot with a "P" next to it represents a

    cardinality of "one or more." (The "P" stands for "positive.") A black dot

    with a "Z" next to it represents a cardinality of "zero or one." It is

    important to remember that when determining the cardinality between two

    entities, assume "X" occurrences of the dotted-end entity per one instance

    of the other entity.

    Business Rules It is in this manner that two entities can be related to each other, and an

    internal rule (also known as a business rule) is developed. For example,

    the business rule statement derived from the example data model above is:

    "Every CUSTOMER submits zero, one, or many

    WORK-REQUESTs."

    The business rule can also be read in reverse in this manner:

    Every WORK-REQUEST must be submitted by one and only one

    CUSTOMER."

  • 8/2/2019 LCMA3

    12/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-12

    Given the relationship, the cardinality and the resultant business rule, the

    entity CUSTOMER is said to be a "parent" of WORK-REQUEST, and

    WORK-REQUEST, in turn, is a "child" of CUSTOMER. More about this

    later.

    The data model example shown in Figure 3-3 represents the simplest and

    first form of a data model. It is called an Entity - Relationship (E-R)

    model because it depicts only entities and their relationships to each other.

    Building E-R models is a critical step in defining the requirements and

    relationships in a relational database.

    The following example in Figure 3-4 is needed to illustrate a more

    detailed data model which is called a Key-Based (K-B) model:

    Figure 3-4. Key-Based Model

    Key-Based The model in Figure 3-4 shows several different types of "data elements,"

    Modelswhich are sometimes referred to an "attributes" or "data items." Data

    elements are common characteristics of an entity. In the example above,

    the entity CUSTOMER has a common characteristic (data element) called

  • 8/2/2019 LCMA3

    13/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-13

    CUSTOMER-NAME. CUSTOMER-ADDRESS is another data element

    of the entity CUSTOMER. Naming conventions must be established for

    these data elements.

    In a key-based data model, an entity is drawn as a box with a horizontal

    line through it. The data element(s) listed above the horizontal line denote

    the "primary key" of an entity. The primary key, also known as simply

    the "key," is said to be the minimum data element(s) needed to uniquely

    identify one instance of an entity from another. In Figure 3-4, the name

    of the CUSTOMER identifies one instance from another and is, therefore,

    a "key data element."

    Non-Key Data Data elements that are below the line, such as CUSTOMER-ADDRESS,

    Elementsare called "non-key data elements." Non-key data elements are useful

    characteristics of the data entity, but are not needed to uniquely identify

    one CUSTOMER from another. As stated above, naming conventions

    must also be established for non-key data elements.

    Foreign and The key to the entity WORK-REQUEST is both CUSTOMER-NAME

    Native Keysand CUSTOMER-REQUEST-DATE. In order to uniquely identify one

    WORK-REQUEST from another, the model indicates that both data

    elements are needed. There is, however, an important difference betweenthese two data elements. CUSTOMER-NAME is said to be a "foreign

    key" of WORK-REQUEST. It has "migrated" from the parent entity,

    CUSTOMER, to the child entity, WORK-REQUEST. A foreign key is

    denoted with an "(FK)" after the name of the data element. Conversely,

  • 8/2/2019 LCMA3

    14/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-14

    CUSTOMER-REQUEST- DATE is said to be a "native" data element to

    the WORK-REQUEST entity. Entities with only native keys are said to

    be independent. Entities that depend on another entity to supply one or

    more identifying keys, are said to be dependent. Independent entities

    [boxes] have square corners; dependent entities [boxes] have rounded

    corners.

    Data Model - The highest level of refinement of a logical data model is one that has

    Fully Attributed been fully attributed, i.e., it includes all of the data elements pertinent to

    the business process(es) being considered for automation.

    Data Model - The last important component to understanding a data model lies in the

    Glossaryglossary that accompanies such a diagram. Complete definitions for all

    entities and data elements can be found in the glossary. An example of

    data definitions, extracted from the USACE Data Encyclopedia, is

    provided in the screen prints (initial and continuation) shown in Figure 3-

    5. The actual data resident in the encyclopedia is shown in bold type.

  • 8/2/2019 LCMA3

    15/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-15

    Figure 3-5. Representative Data Definitions

  • 8/2/2019 LCMA3

    16/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-16

    Data Modeling - The above paragraphs provide a brief overview of the IDEF1X data model

    Facilitationsyntax. If familiar with this material, the reader will be able to participate

    in validation of an IDEF1X data model. If the reader is a member of a

    modeling team, additional training is normally provided, along with the

    services of an experienced modeler to act as a facilitator for the project.

    While the technique may appear to be intuitive, the critical uses to which

    the models are put (development of the DBMS specific data definition

    language (DDL), guidance to programmers and maintainers, etc.) demand

    "professional" facilitation. "Professional" facilitation can be supplied by

    experienced Corps personnel or by contractor support. Facilitation by an

    experienced modeler can significantly accelerate the modeling process,

    but care must be exercised in the management of the modeling group's

    dynamics to insure that the facilitator does not dominate the modeling

    process.

    Data Model A data model should be read by both functional and technicalValidation

    components of an organization to validate the contents therein. The

    functional reviewers of a model bring to the analysis their day-to-day

    practical expertise in the business area from the viewpoint of a regular

    user of the data modeled. The technical reviewer, knowledgeable in the

    details of storage, manipulation, and management of the data involved,

    brings to the analysis expertise in the area of systems design and computer

    operations.

    To validate a data model, team members should ask questions that seek to

    either contradict or reinforce the diagram. For example, using Figure 3-4,

    one could ask if a single WORK-REQUEST can be submitted by more

  • 8/2/2019 LCMA3

    17/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-17

    than one CUSTOMER. If so, then the model depicted is unable to

    incorporate this business rule; it is incorrect, or at least inadequate.

    Another example might be: Can a single CUSTOMER submit more than

    one WORK-REQUEST in a single day? If this is a valid possibility, then

    the keys used to uniquely identify WORK-REQUEST are inadequate and

    an alternative key should be considered.

    Data Models - Some important considerations concerning the quality of a data model are:

    Quality Issues

    The model must reflect the correct viewpoint for the purpose intended.

    If the viewpoint is not correct, data and rules excluded from the model

    will prevent proper automation of their associated work processes.

    Relationships should be as specific as possible. Verbs like "is" and

    "has" should be avoided. For example don't say "a purchase request

    generates one or more purchase orders" if you really mean "a purchase

    request satisfies the need to purchase goods and services via one or

    more purchase orders".

    Follow the rule same name - same meaning throughout the data

    model. Do not use words ambiguously. No duplicate names or

    relationships are allowed.

    Avoid non-specific relationships such as "many to many". If one

    employee can belong to many committees and one committee can be

    staffed by many employees, it is impossible to associate a specific

    employee with a specific committee.

  • 8/2/2019 LCMA3

    18/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-18

    Identify all alternate keys and aliases.

    Make sure all key data elements can not have a null value.

    Make sure that each entity is identified by the key, the whole key and

    nothing but the key.

    STRAP Process The Structured Requirements Analysis Planning (STRAP) process is the

    forum for detailing functional and information requirements using the

    IDEF0 activity and IDEF1X data models. The complexity of the business

    process and the impact of the project across organizational levels will

    determine the depth of the STRAP process. The following table presents

    considerations for the Project Manager (PM) in preparing for the STRAP.

    Task Considerations

    1. Select Team Team includes core members and subject matter experts (SME). Core members should provide

    broad knowledge of subject under study. Team leader must have leadership skills needed to keep

    work on schedule and produce high quality deliverables. Normally the Core Team leader is the

    PM.

    2. Plan Kick-off planning includes definition of schedule, deliverables, scope training, objectives, and

    STRAP kick- critical success factors. Identify members of STRAP review board. FP should chair the review

    off board and be present at kick-off.

    3. Arrange This includes trainers, facilitators, modeling technicians, and clerical staff. May be Corps

    STRAP employees or contractors or a mixture of the two. Proven capability is critical here, especially for

    support staff the lead facilitator. Tailor IDEF training to the needs of the STRAP.

    4. Arrange for Facilities include a room large enough to accommodate core team, support staff, and one or twoFacilities and SME. Equip room with white boards. printing whiteboards, if available, are a very desirable

    Equipment option. Equipment includes two PCs with capability of accessing USACE Data Encyclopedia,

    one printer, and software for word processing and financial analyses. The more sophisticated

    STRAPs should plan to use a groupware facility and software to expedite the modeling process.

    5. Conduct Arrange to bring together Core Team, Review Board, and subject matter experts. The key is to

    kick-off develop a shared and documented understanding of the scope and objectives, critical success

    factors, schedule, deliverables and level of commitment for all members of this STRAP effort.

  • 8/2/2019 LCMA3

    19/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-19

    Table 3-1. Considerations for STRAP Preparation

    The STRAP kick-off establishes expectations for the STRAP. It defines

    the who, what, when, how and where for the STRAP. The Review Board,

    Core Team and Subject Matter Experts (SME) come together for the first

    time. It is important to select a room with ample size and facilities for the

    meeting. The kick-off meeting will last from one to four hours,

    depending on the complexity of the project. The PM conducts the kick-

    off meeting. One of the first tasks is to develop a project scope statement

    during the meeting. Second, the team needs to identify the team's

    objectives and critical success factors. Third, the team should set

    schedules and define deliverables for the project.

    Introductory training in IDEF is desirable either as part of the kick-off, or

    immediately following the kick-off. However, don't go overboard on

    training! Team and Review Board members are not going to become

    professional IDEF modelers. Training is to prepare them to work with a

    professional modeler (the facilitator) to build and understand models.

    Excessive training is a turn-off and a waste of resources.

    AS-IS and TO-BE After the kick-off meeting, the team begins detailing the original IDEF0

    Modelsmodels of present business process. These are called "AS-IS Activity

    Models." The team should identify as many improvement opportunities as

    possible during this modeling effort. These improvement opportunities,

    after validation and prioritization by the Review Board, are the changes

    used to define the "TO-BE" activity models. Improvement opportunities

    do not have to include automation, since the goal is to define better ways

  • 8/2/2019 LCMA3

    20/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-20

    to do business. For a detailed discussion of the AS-IS IDEF0 modeling

    activity, see the beginning of this appendix.

    After modeling the AS-IS work processes, continue detailing the original

    IDEF1X data models. As a part of building the IDEF1X data models,

    search the USACE Data Encyclopedia to determine whether the team is

    creating new data elements or merely discovering the need to use existing

    data elements. The Command or local Data Administrator can also serve

    as a guide to review the Command Data Models to see where the AIS-

    specific project data models intersect with command data. A high or

    medium degree of data intersection means that other corporate

    information systems may meet the specific AIS information requirements.

    The derived data models identify data entities (a.k.a. data classes) and

    their attributes (a.k.a. data elements). The models also capture current

    business rules (relationships and cardinality) controlling performance of

    work processes. Management should place all models under configuration

    control.

    At the conclusion of the AS-IS modeling activity, the team needs to

    conduct a review of the work accomplished. The Review Board confirms

    the validity of the modeled work processes and improvement

    opportunities. The board also prioritizes improvement opportunities for

    incorporation in the TO-BE models.

  • 8/2/2019 LCMA3

    21/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-21

    Implicit in the TO-BE modeling, is the need to decide on specific approaches to automation .

    These decisions require consideration of both costs and benefits. Build TO-BE activity and data

    models to reflect high priority improvements and cost efficiencies selected by the review board.

    In building these models, be sure to consider available alternatives. Modification of existing

    resources is a real alternative to complete new development. Before starting the modeling effort,

    survey and evaluate existing or "under construction" AIS capabilities. Activity and data models

    from other AIS will describe processes, entities, and business rules that may have applicability to

    the current modeling effort. At the conclusion of the TO-BE activity and data modelling effort,

    it is important to begin thinking about, discussing, and documenting what might be the bestfunctional and technical approaches to satisfy work process improvements and the program

    strategy (i.e., Grand Design, Incremental, Evolutionary, or Other) for an AIS project. Functional

    and technical approaches will influence Acquisition Strategy/Planning, and Program Strategy

    will affect all activities in the LCMIS phases.

    STRAP Wrap-Up To complete the TO-BE modeling process, enter models, definitions and

    data characteristics into the USACE Data Encyclopedia. Data

    administration of the logical data model for the new AIS is required.

    Make sure that the System Developer (SD) is coordinating with the

    appropriate Corps Data Administrators. The team needs to follow

    established procedures for the handling of unique organization data.

    Compliance with data management and adminstration requirements is an

    exit criterion for each phase Milestone Review. The PM needs to ensure

    the SD does not circumvent these requirements. The data administration

    staff at each level of the Corps are potential partners for an AIS program -

    - use them.

  • 8/2/2019 LCMA3

    22/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-22

    STRAP IPR The final effort of the STRAP is the final In-Process Review (IPR). In

    this review, the FP and the Review Board validate the TO-BE models and

    analyses supporting those models. The AIS PM should prepare for the

    final IPR by completing all documentation requirements for models and

    analyses. In addition, the PM should ensure that data adminstration

    requirements are under control. Finally, the PM should prepare a brief

    outline of the proposed implementation plan for the AIS.

    The PM should schedule the final IPR with the FP and Review Board,

    with the full STRAP team in attendance at the IPR. The PM should also

    invite representatives of organizations who have worked with the team

    during the STRAP. The objectives of the final IPR are:

    Validation of alternative analysis.

    Validation of TO-BE models.

    Concurrence on outline of important documents such as the

    Operational Concept Description (OCD) and System Decision

    Paper (SDP)/Abbreviated System Decision Paper (ASDP).

    After the review, the PM needs to update all documentation to reflect final

    decisions of the FP and Review Board. A copy of the final documentation

    should be sent to each member of the STRAP Core Team and to theofficial project file.

  • 8/2/2019 LCMA3

    23/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-23

    Modeling and To support the modeling of business/functional processes, DoD has

    Related Toolsestablished a Loaner Tool Library of software for use in preparing

    activity/data models and associated cost/economic analysis requirements.

    A omplete description of the library resources is provided in Attachment 1

    to this appendix.

    Key References - The following key reference is relevant to this appendix:

    Appendix 3 Designing Quality Databases with IDEF1X Information Models by

    Thomas A. Bruce, Dorset-House Publishing, 1991, ISBN, 0-

    932633-18-8.

  • 8/2/2019 LCMA3

    24/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-24

    THIS PAGE INTENTIONALLY LEFT BLANK

  • 8/2/2019 LCMA3

    25/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-25

    ATTACHMENT 1

    DoD LOANER TOOL LIBRARY

  • 8/2/2019 LCMA3

    26/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-26

    THIS PAGE INTENTIONALLY LEFT BLANK

  • 8/2/2019 LCMA3

    27/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-27

    Loaner Tool To support DoD Functional Process Improvement (FPI) efforts, DoD

    Libraryestablished a Loaner Tool Library in 1992. The library, operated by the

    DoD Center for FPI Expertise (CFFE), contains software that enables an

    organization to prepare function or activity models, data models, perform

    activity based costing, simulation, and functional economic analysis. The

    information in this attachment was provided by the DoD Business Process

    Reengineering (BPR) Lab on June 14, 1995.

    These tools are intended to assist users in fast start projects and to enable

    organizations to have temporary use of a tool while expedient purchase of

    a tool takes place.

    There are rules in place for using the tools, as follows:

    Individuals requesting the tool must complete the request form

    (see attached form), sign it, and return it to the CFFE.

    The individual requesting the tool must sign the Loaner Tool

    receipt upon receiving the tool and return the form to the

    CFFE. Anyone leaving an organization after signing the

    request form will still be held responsible for the tool. Special

    arrangements must be made with the CFFE to turn the tool

    over to another person.

    The tool must be kept in the same condition as when received and

    all parts of the package must be returned to the CFFE at the end of

    the loan period.

  • 8/2/2019 LCMA3

    28/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-28

    Any tool damaged or lost is the responsibility of the borrowing

    organization.

    The software must be removed from computer before returning the

    package.

    Tools available from the library are (alphabetical by vendor):

    TOOL VENDOR FUNCTION

    EasyABC ABC Technologies Activity Based Costing

    Modeler Alpha Tech Simulation

    Simprocess CACI Simulation

    COSMO Coe-Truman Activity/Data Models/ABC

    Authormate Eclectic Solutions Activity Models

    AI0win Knowledge Based Systems Activity Models

    SmartER Knowledge Based Systems Data Models

    PROsim Knowledge Based Systems Process Models Simulation

    ERwin/ERX Logic Works Data Models

    ERwin/DBF Logic Works Data Models

    ERwin/BPwin Logic Works Activity Models

    DesignIDEF Meta Software Activity & Data Models (ABC)

    AblePM Triune Software Activity Models

    IDEFine Wizdom Systems Activity & Data Models

    Point of Contact is Betty Roe at DISA/JIEO/CSW/TXF, (703) 681-2421.

  • 8/2/2019 LCMA3

    29/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-29

    Vendor Below is a list of Vendors (alphabetical) with products that support IDEF0

    Informationand 1X, Activity Based Costing, and Simulation. This list includes

    vendors who do not presently have software in the DoD Loaner Library,

    although access to their tool(s) may be possible when visiting the Center

    for FPI Expertise:

    ABC Technologies (503) 626-4895

    Mitchell Systems Corporation (703) 351-6700

    ADAPT

    Alpha Tech (617) 273-3388

    AT&T ISTEL Witness (216) 292-2688 ext 318

    Interfaces with KBSI tools

    CACI (703) 875-2900

    Coe-Truman (703) 836-2671

    Eclectic Solutions (619) 454-5781

    KBSI (409) 260-5274

    Logic Works (800) 783- 7946

    Meta Software (617) 576-6920

    Technology Economics, Inc. (301) 984-1334

    Texas Instruments (703) 849-1464

    Triune Software (513) 427-9900

    Systems Modeling Corporation (412) 741-3727

    Wizdom Systems (703) 548-7900

    For further information call 1-800-TELL-CIM.

  • 8/2/2019 LCMA3

    30/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-30

    UNCLASSIFIED FACSIMILE PAGE

    DEFENSE INFORMATION SYSTEMS AGENCY

    REQUEST FOR A LOANER TOOL

    FROM: TO: BETTY ROE

    OFFICE: OFFICE: DISA JIEO/CIM/TXF

    FAX PHONE: FAX PHONE: 703-681-2863

    PHONE: PHONE: 703-681-2421

    NO. OF PAGES (incl header) NO. OF PAGES (incl header)

    DATE: DATE:

    The information below must be completed by a Government person responsible for the loaner tool package. For

    information or assistance please call Betty Roe at 703-681-2421.

    NAME:

    ORGANIZATION (spell out):

    COMPLETE MAILING ADDRESS:

    TELEPHONE:

    DATE OF CALL:

    METHOD REQUESTED: IDEF0 IDEF1X ABC SIMULATION FEA MODEL

    NAME OF TOOL:

    FUNCTION AREA (Information Management, Material Resources, Finance, Health, Human Resources, etc.):

    NAME OF BUSINESS PROCESS REENGINEERING PROJECT:

    LIST OF PROJECT OBJECTIVES:

    Loaner tools are loaned to DoD Agencies involved in an BPR/FPI project(s). An Agency may only have one tool at a time. Period of loan is for

    30, 60, or 90 days. The borrowing organization is responsible for damaged or lost tool packages. You must remove the software from computer

    IAW licensing agreements before return. All original documentation, software diskettes, and other parts of the package must be returned in

    working order.

    Signature

    UNCLASSIFIED FACSIMILE PAGE

  • 8/2/2019 LCMA3

    31/32

    Appendix 3 - Introduction to IDEF Methodology

    USACE LCM Manager's Guide - Version 2.0 March 31, 1996

    Appendix 3 Page A3-31

    Appendix 3 - Topic Index

    AS-IS and TO-BE Models A3-20

    Business Rules A3-11

    Cardinality A3-10

    Context Diagrams A3-4

    Data Model - Fully Attributed A3-14

    Data Model - Glossary A3-14

    Data Model Validation A3-16

    Data Modeling - Facilitation A3-16

    Data Models - Quality Issues A3-17

    Entity Relationships A3-10

    Entity Rules A3-10

    Foreign and Native Keys A3-13

    ICOMS A3-3

    ICOMS - Split and Bundled A3-5

    IDEF Methodology - Introduction A3-1

    IDEF Models - Quality Issues A3-7

    IDEF0 - Model Review A3-6

    IDEF0 - Numbering Activities A3-5

    IDEF0 Activity Modeling A3-2

    IDEF0 Modeling Tools A3-8

    IDEF1X - Data Modeling A3-8

    Key References - Appendix 3 A3-23

    Key-Based Models A3-13

    Loaner Tool Library A3-27

    Modeling and Related Tools A3-23

    Non-Key Data Elements A3-13

  • 8/2/2019 LCMA3

    32/32

    Appendix 3 - Introduction to IDEF Methodology

    STRAP IPR A3-22

    STRAP Process A3-18STRAP Wrap-Up A3-21

    Vendor Information A3-29