Class-based Modeling
Outline
• What is a class diagram?
• Identifying classes
• Elements of a UML Class Diagram
– Associations
– Generalization
– Dependencies
3
Essential Elements of a UML
Class Diagram
• Class
• Attributes
• Operations
• Relationships
– Associations
– Generalization
– Dependency
– Realization
• Constraint Rules and Notes
4
What is a Class Diagram?
• A class diagram describes the types of
objects in the system and the various kinds of
static relationships that exist among them.
– A graphical representation of a static view on
declarative static elements.
• A central modeling technique that runs
through nearly all object-oriented methods.
• The richest notation in UML.
5
Classes
• A class is the description of a set of
objects having similar attributes,
operations, relationships and behavior.
Window
size: Size
visibility: boolean
display()
hide()
Class
Name
Attributes
Operations
Identifying Analysis Classes
1) Perform a grammatical parse of the problem statement or use cases
2) Classes are determined by underlining each noun or noun clause
3) A class required to implement a solution is part of the solution space
4) A class necessary only to describe a solution is part of the problem space
5) A class should NOT have an imperative procedural name (i.e., a verb)
6) List the potential class names in a table and "classify" each class according
to some taxonomy and class selection characteristics
7) A potential class should satisfy nearly all (or all) of the selection
characteristics to be considered a legitimate problem domain class
(More on next slide)
Potential classes General
classification
Selection
Characteristic
s
Grammatical Parse
• The SafeHome security function enables the homeowner to configure the security
system when it is installed, monitors all sensors connected to the security system, and
interacts with the homeowner through the Internet, a PC, or a control panel.
• During installation, the SafeHome PC is used to program and configure the system. Each
sensor is assigned a number and type, a master password is programmed for arming and
disarming the system, and telephone number(s) are input for dialing when a sensor event
occurs.
• When a sensor event is recognized, the software invokes an audible alarm attached to
the system. After a delay time that is specified by the homeowner during system
configuration activities, the software dials a telephone number of a monitoring service,
provides information about the location, reporting the nature of the event that has been
detected. The telephone number will be redialed every 20 seconds until a telephone
connection is obtained.
• The homeowner receives security information via a control panel, the PC, or a browser,
collectively called an interface. The interface displays prompting messages and system
status information on the control panel, the PC, or the browser window. Homeowner
interaction takes the following form…
Grammatical Parse
• The SafeHome security function enables the homeowner to configure the security
system when it is installed, monitors all sensors connected to the security system, and
interacts with the homeowner through the Internet, a PC, or a control panel.
• During installation, the SafeHome PC is used to program and configure the system.
Each sensor is assigned a number and type, a master password is programmed for
arming and disarming the system, and telephone number(s) are input for dialing when
a sensor event occurs.
• When a sensor event is recognized, the software invokes an audible alarm attached to
the system. After a delay time that is specified by the homeowner during system
configuration activities, the software dials a telephone number of a monitoring service,
provides information about the location, reporting the nature of the event that has been
detected. The telephone number will be redialed every 20 seconds until a telephone
connection is obtained.
• The homeowner receives security information via a control panel, the PC, or a
browser, collectively called an interface. The interface displays prompting messages
and system status information on the control panel, the PC, or the browser window.
Homeowner interaction takes the following form…
• General classifications for a potential class
– External entity (e.g., another system, a device, a person)
– Thing (e.g., report, screen display)
– Occurrence or event (e.g., movement, completion)
– Role (e.g., manager, engineer, salesperson)
– Organizational unit (e.g., division, group, team)
– Place (e.g., manufacturing floor, loading dock)
– Structure (e.g., sensor, vehicle, computer)
Identifying Analysis Classes
(continued)
(More on next slide)
Class Selection Criteria
1. Retained information
2. Needed services
3. Multiple attributes
4. Common attributes
5. Common operations
6. Essential requirements
Identifying Classes
Potential class Classification Accept / Reject
homeowner role; external entity reject: 1, 2 fail
sensor external entity accept
control panel external entity accept
installation occurrence reject
(security) system thing accept
number, type not objects, attributes reject: 3 fails
master password thing reject: 3 fails
telephone number thing reject: 3 fails
sensor event occurrence accept
audible alarm external entity accept: 1 fails
monitoring service organizational unit; ee reject: 1, 2 fail
Defining Attributes of a Class
• Attributes of a class are those nouns from the grammatical parse
that reasonably belong to a class
• Attributes hold the values that describe the current properties or
state of a class
• An attribute may also appear initially as a potential class that is later
rejected because of the class selection criteria
• In identifying attributes, the following question should be answered
– What data items (composite and/or elementary) will fully define a
specific class in the context of the problem at hand?
• Usually an item is not an attribute if more than one of them is to be
associated with a class
Defining Operations of a Class
• Operations define the behavior of an object
• Four categories of operations
– Operations that manipulate data in some way to change the state of an
object (e.g., add, delete, modify)
– Operations that perform a computation
– Operations that inquire about the state of an object
– Operations that monitor an object for the occurrence of a controlling
event
• An operation has knowledge about the state of a class and the
nature of its associations
• The action performed by an operation is based on the current
values of the attributes of a class
• Using a grammatical parse again, circle the verbs; then select the
verbs that relate to the problem domain classes that were
previously identified
Identifying operations
• The SafeHome security function enables the homeowner to configure the security
system when it is installed, monitors all sensors connected to the security system, and
interacts with the homeowner through the Internet, a PC, or a control panel.
• During installation, the SafeHome PC is used to program and configure the system. Each
sensor is assigned a number and type, a master password is programmed for arming and
disarming the system, and telephone number(s) are input for dialing when a sensor event
occurs.
• When a sensor event is recognized, the software invokes an audible alarm attached to
the system. After a delay time that is specified by the homeowner during system
configuration activities, the software dials a telephone number of a monitoring service,
provides information about the location, reporting the nature of the event that has been
detected. The telephone number will be redialed every 20 seconds until a telephone
connection is obtained.
• The homeowner receives security information via a control panel, the PC, or a browser,
collectively called an interface. The interface displays prompting messages and system
status information on the control panel, the PC, or the browser window. Homeowner
interaction takes the following form…
Identifying operations
• The SafeHome security function enables the homeowner to configure the security
system when it is installed, monitors all sensors connected to the security system, and
interacts with the homeowner through the Internet, a PC, or a control panel.
• During installation, the SafeHome PC is used to program and configure the system. Each
sensor is assigned a number and type, a master password is programmed for arming and
disarming the system, and telephone number(s) are input for dialing when a sensor event
occurs.
• When a sensor event is recognized, the software invokes an audible alarm attached to
the system. After a delay time that is specified by the homeowner during system
configuration activities, the software dials a telephone number of a monitoring service,
provides information about the location, reporting the nature of the event that has been
detected. The telephone number will be redialed every 20 seconds until a telephone
connection is obtained.
• The homeowner receives security information via a control panel, the PC, or a browser,
collectively called an interface. The interface displays prompting messages and system
status information on the control panel, the PC, or the browser window. Homeowner
interaction takes the following form…
Class Diagram
Class diagram for the system class
Class Diagram
Class diagram for FloorPlan
Class Diagrams
Top: Multiplicity
Bottom: Dependencies
19
Associations
• A semantic relationship between two or more classes
that specifies connections among their instances.
• A structural relationship, specifying that objects of
one class are connected to objects of a second
(possibly the same) class.
• Example: “An Employee works for a Company”
Company
Department
Employee
20
Associations (cont.)
• An association between two classes indicates
that objects at one end of an association
“recognize” objects at the other end and may
send messages to them.
– This property will help us discover less trivial
associations using interaction diagrams.
21
Associations (cont.)
StaffMember Student
1..* *
instructs
instructor
Association
name
Role
name
Multiplicity
Navigable
(uni-directional)
association
Courses
pre -
requisites
0..3
Reflexive
association
Role
*
UML Class Diagrams 22
Associations (cont.)
• To clarify its meaning, an association may be
named.
– The name is represented as a label placed midway
along the association line.
– Usually a verb or a verb phrase.
• A role is an end of an association where it
connects to a class.
– May be named to indicate the role played by the class
attached to the end of the association path.
• Usually a noun or noun phrase
• Mandatory for reflexive associations
UML Class Diagrams 23
Associations (cont.)
• Multiplicity
– The number of instances of the class, next to
which the multiplicity expression appears, that
are referenced by a single instance of the
class that is at the other end of the
association path.
– Indicates whether or not an association is
mandatory.
– Provides a lower and upper bound on the
number of instances.
UML Class Diagrams 24
Associations (cont.)
– Multiplicity Indicators
Exactly one 1
Zero or more (unlimited) * (0..*)
One or more 1..*
Zero or one (optional association) 0..1
Specified range 2..4
Multiple, disjoint ranges 2, 4..6, 8
25
Aggregation
• A special form of association that models a
whole-part relationship between an aggregate
(the whole) and its parts.
– Models a “is a part-part of” relationship.
Whole Part
Car Door House
1..*
2..*
UML Class Diagrams 26
Aggregation (cont.)
• Aggregation tests:
– Is the phrase “part of” used to describe the
relationship?
• A door is “part of” a car
– Are some operations on the whole automatically
applied to its parts?
• Move the car, move the door.
– Are some attribute values propagated from the
whole to all or some of its parts?
• The car is blue, therefore the door is blue.
– Is there an intrinsic asymmetry to the relationship
where one class is subordinate to the other?
• A door is part of a car. A car is not part of a door.
UML Class Diagrams 27
Composition
• A strong form of aggregation
– The whole is the sole owner of its part.
• The part object may belong to only one whole
– Multiplicity on the whole side must be zero or one.
– The life time of the part is dependent upon the
whole.
• The composite must manage the creation and
destruction of its parts.
Circle Point
3..*
1
Polygon
Point
Circle
28
Generalization
• Indicates that objects of the specialized class
(subclass) are substitutable for objects of the
generalized class (super-class).
– “is kind of” relationship.
Shape
{abstract}
Circle
Super
Class
Sub
Class
An abstract
class
Generalizatio
n relationship
{abstract} is a
tagged value that
indicates that the
class is abstract.
The name of an
abstract class
should be italicized
29
Generalization
• A sub-class inherits from its super-class
– Attributes
– Operations
– Relationships
• A sub-class may
– Add attributes and operations
– Add relationships
– Refine (override) inherited operations
• A generalization relationship may not be
used to model interface implementation.
Summary
• What is a class diagram?
• Identifying classes/Operations/Attributes
• Associations
– Simple associations
– Multiplicity
– Aggregation
– Composition
– Generalization

More Related Content

PPT
Slides chapter 8
PPT
Software engg. pressman_ch-8
PPTX
Class based modeling
PPSX
DOCX
Systems Analysis Problem Imagine that you, as Systems Analyst, h.docx
PPT
Flow oriented modeling
PPTX
Basic Intrusion Detection Systems (IDS).pptx
PPTX
8 system models
Slides chapter 8
Software engg. pressman_ch-8
Class based modeling
Systems Analysis Problem Imagine that you, as Systems Analyst, h.docx
Flow oriented modeling
Basic Intrusion Detection Systems (IDS).pptx
8 system models

Similar to lecture_18class_diagrams.ppt (20)

PPTX
8 system models (1)
PDF
Nist 800 82
PPT
lec-10 Design-Principles.ppt
PPT
Lecture 15 requirements modeling - scenario, information and analysis class...
PPT
Burglar alarm basics-8
DOCX
Data flow diagram
PPT
Chapter 08
PPT
Total Security Solutions-30 BATCH 11-10-2013
DOCX
SECURITY SOFTWARE RESOLIUTIONS (SSR) .docx
PDF
protegegx-brochure-ict-access-control- system
PPT
Socio Technical Systems in Software Engineering SE2
PDF
firozreport.pdf
PDF
White Paper on Security Systems for residential installations - Version 2.0 -...
PDF
Protecting location privacy in sensor networks against a global eavesdropper
PDF
Protecting location privacy in sensor networks against a global eavesdropper
PDF
Security framework for connected devices
PDF
News letter oct 11
PPT
Lecture 11 understanding requirements (3)
PPTX
OODM through UML [Chapter 2] according to PU.pptx
PDF
Recomended ip telephony architecture
8 system models (1)
Nist 800 82
lec-10 Design-Principles.ppt
Lecture 15 requirements modeling - scenario, information and analysis class...
Burglar alarm basics-8
Data flow diagram
Chapter 08
Total Security Solutions-30 BATCH 11-10-2013
SECURITY SOFTWARE RESOLIUTIONS (SSR) .docx
protegegx-brochure-ict-access-control- system
Socio Technical Systems in Software Engineering SE2
firozreport.pdf
White Paper on Security Systems for residential installations - Version 2.0 -...
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Security framework for connected devices
News letter oct 11
Lecture 11 understanding requirements (3)
OODM through UML [Chapter 2] according to PU.pptx
Recomended ip telephony architecture
Ad

More from 23017156038 (7)

PPTX
ch5.pptx CUP Scheduling and its details in OS
PPTX
class5jf.pptx Block cipher in information security
PPT
Network security in computer network for BS
PPT
Ppt IT Infrastructure.ppt
PDF
COCOMO 1 Model ppt AR-1.pdf
PDF
Datacenters.pdf
PPT
Week_01-Intro to Software Engineering-1.ppt
ch5.pptx CUP Scheduling and its details in OS
class5jf.pptx Block cipher in information security
Network security in computer network for BS
Ppt IT Infrastructure.ppt
COCOMO 1 Model ppt AR-1.pdf
Datacenters.pdf
Week_01-Intro to Software Engineering-1.ppt
Ad

Recently uploaded (20)

PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
HVAC Specification 2024 according to central public works department
PDF
Empowerment Technology for Senior High School Guide
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
IGGE1 Understanding the Self1234567891011
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
20th Century Theater, Methods, History.pptx
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
International_Financial_Reporting_Standa.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Unit 4 Computer Architecture Multicore Processor.pptx
HVAC Specification 2024 according to central public works department
Empowerment Technology for Senior High School Guide
What if we spent less time fighting change, and more time building what’s rig...
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
FORM 1 BIOLOGY MIND MAPS and their schemes
IGGE1 Understanding the Self1234567891011
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
20th Century Theater, Methods, History.pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
History, Philosophy and sociology of education (1).pptx
Uderstanding digital marketing and marketing stratergie for engaging the digi...
International_Financial_Reporting_Standa.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
TNA_Presentation-1-Final(SAVE)) (1).pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Chinmaya Tiranga quiz Grand Finale.pdf

lecture_18class_diagrams.ppt

  • 2. Outline • What is a class diagram? • Identifying classes • Elements of a UML Class Diagram – Associations – Generalization – Dependencies
  • 3. 3 Essential Elements of a UML Class Diagram • Class • Attributes • Operations • Relationships – Associations – Generalization – Dependency – Realization • Constraint Rules and Notes
  • 4. 4 What is a Class Diagram? • A class diagram describes the types of objects in the system and the various kinds of static relationships that exist among them. – A graphical representation of a static view on declarative static elements. • A central modeling technique that runs through nearly all object-oriented methods. • The richest notation in UML.
  • 5. 5 Classes • A class is the description of a set of objects having similar attributes, operations, relationships and behavior. Window size: Size visibility: boolean display() hide() Class Name Attributes Operations
  • 6. Identifying Analysis Classes 1) Perform a grammatical parse of the problem statement or use cases 2) Classes are determined by underlining each noun or noun clause 3) A class required to implement a solution is part of the solution space 4) A class necessary only to describe a solution is part of the problem space 5) A class should NOT have an imperative procedural name (i.e., a verb) 6) List the potential class names in a table and "classify" each class according to some taxonomy and class selection characteristics 7) A potential class should satisfy nearly all (or all) of the selection characteristics to be considered a legitimate problem domain class (More on next slide) Potential classes General classification Selection Characteristic s
  • 7. Grammatical Parse • The SafeHome security function enables the homeowner to configure the security system when it is installed, monitors all sensors connected to the security system, and interacts with the homeowner through the Internet, a PC, or a control panel. • During installation, the SafeHome PC is used to program and configure the system. Each sensor is assigned a number and type, a master password is programmed for arming and disarming the system, and telephone number(s) are input for dialing when a sensor event occurs. • When a sensor event is recognized, the software invokes an audible alarm attached to the system. After a delay time that is specified by the homeowner during system configuration activities, the software dials a telephone number of a monitoring service, provides information about the location, reporting the nature of the event that has been detected. The telephone number will be redialed every 20 seconds until a telephone connection is obtained. • The homeowner receives security information via a control panel, the PC, or a browser, collectively called an interface. The interface displays prompting messages and system status information on the control panel, the PC, or the browser window. Homeowner interaction takes the following form…
  • 8. Grammatical Parse • The SafeHome security function enables the homeowner to configure the security system when it is installed, monitors all sensors connected to the security system, and interacts with the homeowner through the Internet, a PC, or a control panel. • During installation, the SafeHome PC is used to program and configure the system. Each sensor is assigned a number and type, a master password is programmed for arming and disarming the system, and telephone number(s) are input for dialing when a sensor event occurs. • When a sensor event is recognized, the software invokes an audible alarm attached to the system. After a delay time that is specified by the homeowner during system configuration activities, the software dials a telephone number of a monitoring service, provides information about the location, reporting the nature of the event that has been detected. The telephone number will be redialed every 20 seconds until a telephone connection is obtained. • The homeowner receives security information via a control panel, the PC, or a browser, collectively called an interface. The interface displays prompting messages and system status information on the control panel, the PC, or the browser window. Homeowner interaction takes the following form…
  • 9. • General classifications for a potential class – External entity (e.g., another system, a device, a person) – Thing (e.g., report, screen display) – Occurrence or event (e.g., movement, completion) – Role (e.g., manager, engineer, salesperson) – Organizational unit (e.g., division, group, team) – Place (e.g., manufacturing floor, loading dock) – Structure (e.g., sensor, vehicle, computer) Identifying Analysis Classes (continued) (More on next slide)
  • 10. Class Selection Criteria 1. Retained information 2. Needed services 3. Multiple attributes 4. Common attributes 5. Common operations 6. Essential requirements
  • 11. Identifying Classes Potential class Classification Accept / Reject homeowner role; external entity reject: 1, 2 fail sensor external entity accept control panel external entity accept installation occurrence reject (security) system thing accept number, type not objects, attributes reject: 3 fails master password thing reject: 3 fails telephone number thing reject: 3 fails sensor event occurrence accept audible alarm external entity accept: 1 fails monitoring service organizational unit; ee reject: 1, 2 fail
  • 12. Defining Attributes of a Class • Attributes of a class are those nouns from the grammatical parse that reasonably belong to a class • Attributes hold the values that describe the current properties or state of a class • An attribute may also appear initially as a potential class that is later rejected because of the class selection criteria • In identifying attributes, the following question should be answered – What data items (composite and/or elementary) will fully define a specific class in the context of the problem at hand? • Usually an item is not an attribute if more than one of them is to be associated with a class
  • 13. Defining Operations of a Class • Operations define the behavior of an object • Four categories of operations – Operations that manipulate data in some way to change the state of an object (e.g., add, delete, modify) – Operations that perform a computation – Operations that inquire about the state of an object – Operations that monitor an object for the occurrence of a controlling event • An operation has knowledge about the state of a class and the nature of its associations • The action performed by an operation is based on the current values of the attributes of a class • Using a grammatical parse again, circle the verbs; then select the verbs that relate to the problem domain classes that were previously identified
  • 14. Identifying operations • The SafeHome security function enables the homeowner to configure the security system when it is installed, monitors all sensors connected to the security system, and interacts with the homeowner through the Internet, a PC, or a control panel. • During installation, the SafeHome PC is used to program and configure the system. Each sensor is assigned a number and type, a master password is programmed for arming and disarming the system, and telephone number(s) are input for dialing when a sensor event occurs. • When a sensor event is recognized, the software invokes an audible alarm attached to the system. After a delay time that is specified by the homeowner during system configuration activities, the software dials a telephone number of a monitoring service, provides information about the location, reporting the nature of the event that has been detected. The telephone number will be redialed every 20 seconds until a telephone connection is obtained. • The homeowner receives security information via a control panel, the PC, or a browser, collectively called an interface. The interface displays prompting messages and system status information on the control panel, the PC, or the browser window. Homeowner interaction takes the following form…
  • 15. Identifying operations • The SafeHome security function enables the homeowner to configure the security system when it is installed, monitors all sensors connected to the security system, and interacts with the homeowner through the Internet, a PC, or a control panel. • During installation, the SafeHome PC is used to program and configure the system. Each sensor is assigned a number and type, a master password is programmed for arming and disarming the system, and telephone number(s) are input for dialing when a sensor event occurs. • When a sensor event is recognized, the software invokes an audible alarm attached to the system. After a delay time that is specified by the homeowner during system configuration activities, the software dials a telephone number of a monitoring service, provides information about the location, reporting the nature of the event that has been detected. The telephone number will be redialed every 20 seconds until a telephone connection is obtained. • The homeowner receives security information via a control panel, the PC, or a browser, collectively called an interface. The interface displays prompting messages and system status information on the control panel, the PC, or the browser window. Homeowner interaction takes the following form…
  • 16. Class Diagram Class diagram for the system class
  • 19. 19 Associations • A semantic relationship between two or more classes that specifies connections among their instances. • A structural relationship, specifying that objects of one class are connected to objects of a second (possibly the same) class. • Example: “An Employee works for a Company” Company Department Employee
  • 20. 20 Associations (cont.) • An association between two classes indicates that objects at one end of an association “recognize” objects at the other end and may send messages to them. – This property will help us discover less trivial associations using interaction diagrams.
  • 21. 21 Associations (cont.) StaffMember Student 1..* * instructs instructor Association name Role name Multiplicity Navigable (uni-directional) association Courses pre - requisites 0..3 Reflexive association Role *
  • 22. UML Class Diagrams 22 Associations (cont.) • To clarify its meaning, an association may be named. – The name is represented as a label placed midway along the association line. – Usually a verb or a verb phrase. • A role is an end of an association where it connects to a class. – May be named to indicate the role played by the class attached to the end of the association path. • Usually a noun or noun phrase • Mandatory for reflexive associations
  • 23. UML Class Diagrams 23 Associations (cont.) • Multiplicity – The number of instances of the class, next to which the multiplicity expression appears, that are referenced by a single instance of the class that is at the other end of the association path. – Indicates whether or not an association is mandatory. – Provides a lower and upper bound on the number of instances.
  • 24. UML Class Diagrams 24 Associations (cont.) – Multiplicity Indicators Exactly one 1 Zero or more (unlimited) * (0..*) One or more 1..* Zero or one (optional association) 0..1 Specified range 2..4 Multiple, disjoint ranges 2, 4..6, 8
  • 25. 25 Aggregation • A special form of association that models a whole-part relationship between an aggregate (the whole) and its parts. – Models a “is a part-part of” relationship. Whole Part Car Door House 1..* 2..*
  • 26. UML Class Diagrams 26 Aggregation (cont.) • Aggregation tests: – Is the phrase “part of” used to describe the relationship? • A door is “part of” a car – Are some operations on the whole automatically applied to its parts? • Move the car, move the door. – Are some attribute values propagated from the whole to all or some of its parts? • The car is blue, therefore the door is blue. – Is there an intrinsic asymmetry to the relationship where one class is subordinate to the other? • A door is part of a car. A car is not part of a door.
  • 27. UML Class Diagrams 27 Composition • A strong form of aggregation – The whole is the sole owner of its part. • The part object may belong to only one whole – Multiplicity on the whole side must be zero or one. – The life time of the part is dependent upon the whole. • The composite must manage the creation and destruction of its parts. Circle Point 3..* 1 Polygon Point Circle
  • 28. 28 Generalization • Indicates that objects of the specialized class (subclass) are substitutable for objects of the generalized class (super-class). – “is kind of” relationship. Shape {abstract} Circle Super Class Sub Class An abstract class Generalizatio n relationship {abstract} is a tagged value that indicates that the class is abstract. The name of an abstract class should be italicized
  • 29. 29 Generalization • A sub-class inherits from its super-class – Attributes – Operations – Relationships • A sub-class may – Add attributes and operations – Add relationships – Refine (override) inherited operations • A generalization relationship may not be used to model interface implementation.
  • 30. Summary • What is a class diagram? • Identifying classes/Operations/Attributes • Associations – Simple associations – Multiplicity – Aggregation – Composition – Generalization