SE 1-2

1.System
A bigger group of entities/things involved to accomplish a set of specific/particular functions
Software
Includes programs, procedures, rules and related documentation
Packs and delivers “Information”

2.Software Crisis
Time and Cost Slippage
Failure at Customer’s site
Untraceable Errors after delivery
Difficulty in Maintenance
Increase in program size and complexity led to

The Software Crisis:
In the early years of computer applications, the focus of development and innovation was on hardware ? software was largely viewed as an afterthought. Computer programming was an art, at best an arcane practice known to a gifted few. Programmers did not follow any disciplined or formalised approaches ? these were confined to hardware designers.

This way of doing things was adequate for a while, until the sophistication of computer applications outgrew this rough-hewn approach. Software soon took over more and more functions which were hitherto done manually or were hard-automated.  As “software houses” emerged, software began to be developed for widespread distribution. Software development projects produced thousands of source program statements. With no tools or methods of managing this increasing complexity, the number of errors began to accelerate. But the personalised nature of programming made maintenance, or the fixing of these errors, exceedingly difficult. The following situation resulted:
Software projects were taking a lot longer than initially envisaged.
Software was costing a lot more to develop than at first estimated.
Software was being delivered to the customer only to fail.
Errors found by the customer were extremely difficult to track down and fix.

These problems are collectively referred to as the “software crisis”. Clearly, there was a need to rethink software development practices. The consensus which emerged was to borrow ideas about systematic development from another discipline, namely engineering.

3.“Software Engineering” is the application of a systematic, disciplined, quantifiable approach to the development,

4.Software Development Life Cycle (SDLC)
Regardless of exact model or framework used, all Software Development Life Cycle methodologies broadly follow the following Steps.
Requirements Analysis
Design
Build
Testing
Deployment
Maintenance

5.Structure of the processes at Infosys: We have adopted the ETVX-M model that will ensure all aspects of a process are covered.

ETVX-M model means :
Entry, Task, Verification & Validation and Exit - Measurement
Entry :  Involves Planning and Training activities
Task  :  Activities/tasks to be performed for that stage
V&V :  Includes reviews, testing
Measurements for effort and defects are taken for every stage.
Every stage also needs commitment for process improvements .

ETVX-M (Entry, Tasks, Verification, Exit – Measurement) Model is used at Infosys for all the review processes


(task  [tɑ:sk]
n.任务,工作,作业
verification 
n.(名词)
(1). The act of verifying or the state of being verified.
证明;证实:证明的行为或被核实的状态
(2). A confirmation of truth or authority.
核实,核查:对真理或权力的确认
(3). The evidence for such a confirmation.
证词:对这类证实的证据
(4). A formal assertion of validity.
确定,鉴定:对效力的正式断言
(5). Law An affidavit that attests to the truth of a pleading.
【法律】 宣誓供词:证明某一申诉属实的宣誓书)
measurement 
n.衡量,测量[ pl.]尺寸,大小

6.Why follow Process ?
If you DON’T follow process :
Non usable outputs (customer dissatisfaction)
Rework is high (cost overruns)
Cost more than estimated and hence less profitable (cost overruns)
Losing Client (Loss of Goodwill and business)

If you follow process:
Usable outputs
No re-work or less rework
Profitable as cost was as per expectations
Happy client
Repeat business

7.Software Process Models are called as Software Development Life Cycles (SDLCs)
Example:
Waterfall Model:No change in requirements ,Deliverables expected at every stage,Systematic execution
 Pros:
 Simple and systematic model
 Follows a disciplined approach
 Cons:
 Limited or no scope for accommodating new requirements
 Potential delay in identifying the risks which might lead to disastrous / terrible results
Prototype Model:Complete set of requirements not available ,Start development with a set of requirements,Feel of the    product with initial requirements expected
 Pros:
 Less technical risks
 Scope for accommodating new requirements
 A part of product is visible at an early stage itself
 Cons:
 Expensive
 Time Consuming
Spiral Model::Many risks are expected ,There are alternatives,Not fixed budget project
 Pros:
 Model for the other models (Meta Model)
 Captures potential risks at an early stage 
 Iterative and realistic model
 Cons:
 Requires good expertise in risk management and project planning
 In this model, projected cost is revisited and revised every round during Planning. Therefore, if Management  demands fixed-budget development, this model may not be suitable
RAD Model:Less than 3 months for launch of the product ,There are many functionalities,Users have to be involved  through out
 What is RAD Model ?
 Rapid Application Development
 Emphasis is on short development time. Completing system development within a short time (60 days to 90  days)
 Each major function addressed by a separate RAD team
 Users are involved throughout the development life cycle
 Pros:
 Working model of software is visible early
 Continuous stream of documentation is maintained for future upgrades
 Cons:
 At times the design standards may be ignored
 For Large Projects, RAD requires many human resources
 In case system is not properly modularized, integration of modules may create problems

8.The needs (or requirements) of the customer could be classified as functional, performance, reliability, maintainability, safety and security, interoperability, cost, schedule etc.

9.Structured System Analysis and Design (SSAD)
Analysis stage produces a structured requirements specification made of graphical notations 
 process model comprising of a set of data flow diagrams
 set of process specifications
 data model comprising of an entity-relationship diagram
 data-dictionary
Design stage refines the findings of the analysis stage to a greater extent, to make sure that it is easily understood 
 Database Design
 Program Design
SSAD uses a set of tools and techniques to model user requirements. Modeling is done to represent and document the requirements gathered. In SSAD, the system is viewed as being composed of two components namely processes and data .Each of these (processes and data) are modeled more or less separately in the Analysis Stage. Graphical Notations are used for modeling purpose. In the design stage, these are further refined and described.

In SSAD, the system is viewed as being composed of two components, functionality and data, each of which is modeled more or less separately.
Functionality are modeled using a technique called process modeling.
Data is modeled using a technique called data modeling.
Since SSAD models functionality and data separately, we say that it follows a function/data methodology
It is more suitable for data intensive projects

10.Object Oriented Analysis and Design (OOAD)
Object Oriented Analysis
 Examines requirements from the perspective of classes and objects existing in the vocabulary of problem domain
 Example: Use case Diagrams
Object Oriented Design
 Process of object-oriented decomposition and a representation for depicting (showing) the system under design
 Example: Class Diagrams

11.Software Construction (Implementation)
 Coding functions or classes using a computer language and using the right set of tools
 Selecting control structures and organizing them
 Polishing code by formatting and commenting it
 Tuning code to enhance the performance
 Eliminating compilation errors and link errors
 Making the executable code


PS:Recap of DAY - 1
Engineering approach was adopted for Software Development to address the “Software Crisis”
Engineering approach uses Processes, Methods and Tools
Many Software Process Models are in use like Waterfall, Prototype, Spiral and RAD Models
SSAD and OOAD are popular Analysis and Design Methodologies
Software Construction involves Coding and Unit Testing


12.How to find defect in Software Artifacts ?
Reviews (evaluation)
 Requirements Review
 Design Review
 Code Review
 Code-walk-through
Testing
 Unit testing
 Integration testing
 System testing
 Acceptance testing
 Functional testing
 Performance testing
 Regression testing

13.There are 2 kinds of formal reviews conducted at Infosys
One-Person Review (OPR) and Group Review (GR)
Doing Self Review (informal review) is a good practice before conducting the OPR or GR.

14.Code Reviews
Why Code Reviews?
 100% code coverage
 2 to 5 times more defects
 Mix of errors like maintainability can be detected
 Reviews & testing go together
What  to look for   ?
 Complete translation of documented specification
 Adherence to defined standards
 Code maintainability
 Hard coded  values in configuration files
Code Walk Through (CWT) ensures 100% code coverage whereas the best run tests cover only 50-70% of the code.
Programmers can find 2 to 5 times as many defects per hour in reviewing programs as they can in test.
CWT finds a mix of errors that testing doesn’t 
e.g. maintainability
Reviews and Testing are complementary .

Any values hard coded which are otherwise expected to come in thru online screens or Configuration files must also be looked for during code reviews

15.At Infosys, how the following are made sure?
Requirements asked by the customer have been really implemented in the software
Requirements have been really tested before delivery of the software to the customer
The delivered software is not having a functionality not asked by the customer

16.Importance of traceability:
To ensure that no requirements are missed
Helps while doing reviews
Helps during designing test cases
Horizontal Traceability:ensures all requirements are incorporated into product
Vertical Traceability:ensures no unnecessary functionality is included unless specifically called for by a requirement
Traceability is an important activity of Requirements Management.

17.At Infosys, how the following are ensured?
Deliverables to the customer are consistent with each other
Right version of software is delivered to the customer
Software is intact inspite of the failure of the development system (and reformatting of the hard disk)

Configuration Management (CM)
Visual Source Safe (VSS) is a Configuration Management tool used in some projects at Infosys
CM Planning includes:identifying configuration items,identifying naming conventions,defining the workflow,defining the storage structure,defining back-up mechanism
Configuration Management Planning  is done by the Configuration Controller

18.Testing is to find defects, not to show the functionality of the software

PS:Qualities of a Tester:Destructively creative,Good detective skills,Possess skeptical but not hostile attitude,Ability to place herself in user’s shoe,Good understanding of domain,Eye for details

19.Test Planning : Testing and the life cycle
Phase   Deliverables
Requirements Analysis------------User Acceptance Plan, System Test Plan
HLD----------------------------------Integration Test Plan
DLD----------------------------------Unit Test Plan
Coding-------------------------------Unit Tested code
Testing-------------------------------Integrated and System tested code
Acceptance--------------------------Sign -off by the customer
Test plan should be developed as early as possible in software development life cycle. 

User acceptance test plan and System test plan can be written immediately after requirements gathering is complete.
During High Level Design (HLD) , the modules of the project and their interfaces get defined. So after HLD, integration plan can be written.
During Low Level Design (LLD), all the program specifications are prepared. So after LLD, Unit test plans can be written for each module.

20.There are different levels of testing:
Unit Testing
Integration Testing
System Testing
Acceptance Testing
Each of this level will test a phase of SDLC

21.Integration Testing :Top Down ,Bottom Up ,Sandwich ,Big Bang
Big Bang is not advised because :
 It is difficult to debug
 It results in a much throwaway code
 Critical and peripheral modules are not distinguished
 Requires all resources for testing to be present in one go
 The user does not see the product until very late in the life cycle

22.System Testing
Functional Testing  - tests the implementation of the business needs
 Test cases are selected based on the functional specification (requirements)
 Also termed as Black Box Testing
 Example: System Testing
(Structural Testing
 Test cases are selected based on the software structure or implementation
 Also termed as White Box Testing
 Example: Unit Testing)
Performance Testing - tests the non-functional requirements of the system like the speed, load etc
Performance Testing:
 Load Testing :
Testing with many users accessing the system at the same time 
 Stress Testing:
Testing to identify the number of users the system can handle at a time before breaking down
 Endurance Testing
: Testing for a long time for reliability
 Spike Testing
:The system is stressed for a short duration

23.Do’s & Don'ts while Coding
 Follow coding guidelines / standards
 Use relevant (related) tools (Integrated Development Environments)
 Do self review before submitting the code for peer reviews
 Spend adequate time on understanding the requirements, test cases before you start coding
 Update the relevant artifacts as and when necessary like Design, SRS, user manual etc
 Develop the code for optimized performance
 Ensure the code adheres to the design
Do’s & Don'ts while Testing
 Use relevant tools for testing, do explore the option of automated testing
 Spent adequate time on understanding the requirements, test cases before you start testing
 Have adequate test data & test environment to do test your code
 Ensure you have a testing server to test your application. Avoid testing in your machine.
 Update the relevant artifacts as and when necessary like test cases & test results, user documentation etc
 Check the code for optimized performance

24.What do we mean by “Quality Software” ?
No simple answer - depends on who is answering the question !

25.What are the impacts of Bad Quality?
Loss of Goodwill
Loss of Business from a Client
Cost Overruns
Irreparable Damages

26.Quality Control and Quality Assurance
Quality Control (QC):
 Focus is on the Product
 QC measures a product against the existence of a required attribute
 Major QC activity is identifying defects  and correcting them (Rework)
 Inspections, Reviews and Testing activities
Quality Assurance (QA):
 Focus is on the Process rather than Product
 QA ensures “Fitness for Purpose”
 Auditing and Reporting functions
 Building process guidelines, checklists and templates
 Training activities
 Building systems and tools for execution
QA and QC at Project Level
QA:
 Ensuring that Project Management Plan is followed
  Defining the project process through the project plan
 Technology and Business domain training
 Doing audits
QC:
 Requirements, design and code reviews
  Functional Testing
  Non-functional testing
  Rework

27.Verification and Validation (V&V)
Verification (proof):
 Activities that ensure that software correctly implements a function
 Addresses whether the software reflects the specified requirements
Validation (support)
 Activities that ensures that software is traceable to customer requirements
 Demonstrates (shows) that the software fulfills intended (proposed) use in intended environment

28.How to do “Defect Prevention” ?
Learn from past projects
Do defect prevention regularly
 Form DP teams and train them
 Classify defects & draw Pareto’s Chart
 Identify root causes for Defects
 Identify appropriate solutions
 Deploy solutions & validate results
Measure the improvement

29.Types of Defects:Logical,User Interface,Maintainability,Standards


PS:Recap of DAY - 2
Defect Detection activities are intended for identifying the defects in the software
Rework to be carried out to eliminate defects
Defect Detection activities are time consuming and marginally effective
Better way of Reducing defects is by preventing the injection of defects (DP)
Traceability ensures that the requirements have been designed, implemented and tested
CM is needed to store the configuration items for ease of use, consistency of deliverables, version control, release control and back-up mechanisms

<think>嗯,用户需要查询西门子变频器型号6SE7023-2EA87-2DA0的技术规格和文档。这个需求很明确,用户应该是工程师或采购人员,需要技术参数做选型或维护。从引用内容看,用户可能已经看过部分资料,但需要更具体的官方文档。 先拆解型号编码:西门子MASTERDRIVES系列的型号通常分为四段。第一段"6SE7023"是基础型号,代表MASTERDRIVES VC系列中的紧凑型书本规格变频器。第二段"2EA87"包含功率和电压信息——这里"2E"可能表示11kW功率等级(需要验证),"A"通常指400V交流电压,"87"可能是硬件版本。第三段"2DA0"的"2D"可能指IP20防护等级,"A0"可能是固件版本。 用户可能遇到两个难点:一是官网文档分散,二是旧型号资料难找。建议优先查三个来源:1) 西门子工业在线支持平台的"技术文档"专区,用完整型号搜索;2) SIMATIC管理器的帮助文档;3) 老款MASTERDRIVES的操作手册(如6SE70操作说明),通用参数在章节3.1。 考虑到备件替代问题,需要提醒用户注意:这个型号已停产,替代品可能是SINAMICS G120系列。如果用户维护旧设备,最好同时下载6SE70系列的通用手册,里面故障代码和参数设置是通用的。 最后生成的回答要突出行动指引:官网文档路径写清楚,替代型号给出具体参考链接,附带参数验证方法。用户可能急需参数确认电机兼容性,所以功率和电压信息要放最前面。</think>根据西门子MASTERDRIVES系列型号的命名规则和技术文档特征,**6SE7023-2EA87-2DA0**的技术规格及文档获取方式如下: --- ### 一、型号解析与技术规格(基于标准命名规则) 1. **基础型号** `6SE7023`:表示属于MASTERDRIVES **VC(矢量控制)系列**的紧凑型书本规格变频器。 2. **功率与电压代码** `2EA87`: - `2E`:**功率等级为11kW**(400V AC时) - `A`:**400V AC三相输入电压** - `87`:硬件版本标识(可能含散热设计或接口配置) 3. **功能与版本标识** `2DA0`: - `2D`:标准控制板,**IP20防护等级** - `A0`:固件版本/可选功能包(需查补充文档) --- ### 二、关键参数(典型值) | 参数 | 值 | |---------------|---------------------| | 额定功率 | 11 kW (400V AC) | | 输入电压 | 3AC 380–480V ±10% | | 输出电流 | 约 24 A | | 控制方式 | 矢量控制(VC) | | 通信接口 | 标配RS-232/可选Profibus | | 防护等级 | IP20(板载模块) | > ⚠️ 注:实际参数需以**操作手册的铭牌数据**为准[^1]。 --- ### 三、技术文档获取途径 1. **西门子工业支持官网** 访问 [Siemens Industry Online Support](https://support.industry.siemens.com) → 搜索完整型号 **6SE7023-2EA87-2DA0**,可获取: - **操作手册**(如《MASTERDRIVES VC Operating Instructions》) - **参数列表**(参数手册章节P.11-P.15) - **电路图**(安装手册附录) 2. **替代型号文档参考** 若直接文档缺失(因型号较旧),可参考同系列通用文档: - 主手册:**6SE70系列变频器使用大全**(文档编号:A5E00345333) → 涵盖硬件配置、参数设置、故障诊断[^2] - 故障代码表:对应文档的 **Chapter 6.3**(如F025过热处理方案[^2]) 3. **本地化支持** 联系 **西门子工业技术支持中心** 提供完整型号,可获取PDF版技术说明书(含尺寸图与接口定义)。 --- ### 四、注意事项 1. 该型号已停产,替代型号为 **SINAMICS G120** 系列(需重新选型)[^1]。 2. 备件替换参考:控制板CUVC可兼容(如6SE7012-0EP84-1AB0),但需验证固件版本[^2]。 ---
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值