cdcaas-spmp-1.0

Upload: john-kraus

Post on 06-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 CDCAAS-SPMP-1.0

    1/223

    Crime Data

    and Assimi

    Software 62

    Submiss

    Collection, Aggre

    lation System (CDVersion 1.0

    Team Crime Busters

    Sonal VermaBrian H. ParkAkhil Pathania

    John Kraus5 -Software Project Managemerofessor Ken Nidiffer

    ion Date: December 8, 2008

    ation

    AAS)

    nt

  • 8/3/2019 CDCAAS-SPMP-1.0

    2/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    ii

    RevisionsRevisionNumber Date Section Name Description

    SectionUndated Remarks

    0.1 9/11/2008Preface and1.1 ProjectOverview

    First draftPreface and

    1.1

    0.1 9/13/2008Preface and1.1 ProjectOverview

    Updatedocument

    based on teamreview

    Preface,1.1.1 and

    1.1.2

    Decided projectname and team

    name

    0.1 9/14/2008Project

    DescriptionAdded Figures All

    0.12 9/18/2008Project

    Description

    Updated thepackage

    description

    1.1.1

    0.12 9/21/2008Requirement

    EstimateFirst Draft 5.3

    0.12 9/28/2008ProcessModel

    First Draft 2.1

    0.13 10/25/2008 Productivity First Draft 3.4.4

    0.14 11/09/2008Dependencies

    First Draft 5.2

    0.15 11/16/2008ReferenceMaterials

    Final Draft 1.4

    1.0 12/08/08 Complete

  • 8/3/2019 CDCAAS-SPMP-1.0

    3/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    iii

    PrefaceThe following preface is a short narrative on the purpose of the Crime Data

    Collection, Aggregation and Assimilation System (CDCAAS) project.The CDCAAS will provide police officers and investigators with the ability toconveniently and quickly acquire and assimilate, from a variety of diverse electronicsources, information needed to help solve or prevent crimes or hunt down andapprehend criminals. CDCAAS will be a valuable tool for investigators seeking toconnect the dots in their efforts to protect the public and bring wrongdoers tojustice.

    CDCAAS is the first in a new series of applications software suites for System XYZ.System XYZ will be the next major product line for our company, making this projectand this Software Project Management Plan (SPMP) extremely important to the

    continued success of the organization.Furthermore, the CDCAAS project embodies our companys ambitious set of strategicredirection actions to strengthen our responsiveness to customers, increasecompetitiveness by reducing costs, build market share, and field quality products thatmeet or exceed customer requirements.

    Our recent market study concluded that the features offered by the proposed set ofsoftware packages for the new System XYZ computer system will be crucial inachieving our goals for market penetration. This conclusion has been borne out by700 advance orders received for the CDCAAS.

  • 8/3/2019 CDCAAS-SPMP-1.0

    4/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    iv

    AbstractThe Software Project Management Plan (SPMP) contains detail documentation of the

    technical and management aspects involved in various stages in the development ofthe Crime Date Collection, Aggregation and Assimilation System (CDCAAS). Thedocument adheres to the specification provided by the IEEE Standards (1058.1). Thisdocument serves as a controlling document for organizing and managing the resourcesin such a way that these resources deliver all the work required to complete theproject within define scope, time and cost constraints.

    The document is intended to answer various challenges involved in managing theproject like meeting project deadlines, integration of inputs needed to meet pre-defined objectives of providing a cost effective, efficient and automated way ofassimilating data about the criminals from one place rather than from differentresources. This document will be subject to revisions as the project progresses.

  • 8/3/2019 CDCAAS-SPMP-1.0

    5/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    v

    Project Charter

    Project Sponsor InformationSponsor Name: Susan Smith

    Title: Vice President, New Software and Systems EngineeringDevelopment

    Business Need: The Crime Data Collection, Aggregation and Assimilation system(CDCAAS) will provide enhanced functionality for more efficientsearches for the crime data stored in the different kinds of biometricdatabases. This system shall be used by country wide lawenforcement agencies. The primary goal is to provide users with aunified tool that will have the capability to work of differentplatforms, understand all secure formats, and communicate overbroad range of medium without compromising on the stringent level

    of security that is specific to the government agencies and othercorporations. Secondary goals include reduction in operational costand increase in profit margin by providing stable and reliablesoftware.

    Business Benefits: System XYZ will allow the corporation to become the leadingprovider of Crime Data Collection, Aggregation andAssimilation software at all levels of government and in thecommercial sector

    Continued improvement in the quality of life Improved overall data integrity and speed of data access to

    optimize decision making Faster and Higher rates case-closing through more efficient

    gathering and analysis of crime- related data.

    Table 1: Project Sponsor Information

    Major Deliverables

    Product(s) or Service(s)

    Data Management Knowledge Distribution and Delivery

    Analysis and Statistics Information Retrieval , Reports andNotification

    Schedule Constraints and Assumptions

    Planned Start Date:January 28, 2008

    Planned End Date:January 28, 2010

    Latest End Date:

  • 8/3/2019 CDCAAS-SPMP-1.0

    6/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    vi

    Major Deliverables

    Schedule Assumptions: CDCAAS will be developed during the next 24 months with

    many intermediate product releases during the abovementioned period. The alpha test is scheduled on orbefore Jan 28, 2010.

    Schedule Constraints: Schedule Allocation is as follows:

    24 months CDCAAS development

    2 months alpha test at Fairfax, VA (in-house)

    2 months beta test at Chelmsford, MA (customer site)

    2 months rollout to customer sites which includesinstallation and training

    6 months maintenance

    Table 2: Major Deliverables

    Key Staffing RequirementsProject Manager: Title: Date Available:

    Project Manager: Title: Date Available:

    Table 3: Key Staffing Requirements

    Other Constraints and Assumptions

    Constraints CDCAAS software will extend the System XYZ software. CDCAAS willextend the 11 existing System XYZ packages. Three modules will beextended through COTS packages, three will extend reusable portionsof software, and the remaining five modules will be custom written.

    One of the five custom modules will be outsourced to Ivan Industries.

    Table 4: Other Constraints and Assumptions

  • 8/3/2019 CDCAAS-SPMP-1.0

    7/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    vii

    Initial Cost Estimate for CDCAAS

    Labor cost per hour: $200Hardware cost per unit: $1,500Number of Units: 700Kernel KSLOC 20

    Application Software Cost

    Equation I: (Number of Staff Hours) * Labor CostTotal Effort (Staff Months) = 1,030.05Total Effort (Staff Hours) = 164,807.34Staff Hours Per Month = 160.00Labor Cost per hour = $200.00

    ApplicationSoftware Cost

    =

    $32,961,467.66

    Cost Per PackagePackage Name Staff Months Cost

    Database ManagementSystem

    93.31 $2,985,839.13

    Spreadsheet 41.14 1,316,356.25Reqm'ts & Config. Mgmt. 174.39 5,580,610.84Secure Communication 185.41 5,933,252.92Graphics Presentation 41.11 1,315,393.59

    Word Processor 98.27 3,144,759.78Project Management 41.13 1,316,050.46GPS Navigation 135.15 4,324,790.21Compiler 41.09 1,315,009.16Debugger & Test 102.50 3,279,969.71Electronic Inventory &Tracking

    76.54 2,449,435.62

    Total 1,030.05 $32,961,467.66

    System Kernel Software (assuming Kernel size is 20K SLOC)

    COCOMO man-month effort = 7.39 * (KSLOC) ^ 1.2

    Total Effort (Staff Months) = 269.08Total Effort (Staff Hours) = 43,052.70Labor cost per hour = $200.00

    Kernel Cost = $8,610,540.45

  • 8/3/2019 CDCAAS-SPMP-1.0

    8/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    viii

    System XYZ Hardware

    Equation 2: Cost per unit * No. of UnitsCost per unit = $1,500

    No. of Units = 700Hardware Cost

    =$1,050,000.00

    Subtotal = $42,622,008.12

    Table 5-Initial Cost Estimate for CDCAAS

  • 8/3/2019 CDCAAS-SPMP-1.0

    9/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    ix

    Project ScopeThe Crime Data Collection, Aggregation and Assimilation System (CDCAAS) project

    provides police agencies such as the Federal Bureau of Investigation (FBI), Interpol,Department of Homeland Security, Law Enforcement and Corporations the capabilityfor a secure, efficient and reliable mechanism to acquire detailed crime-solvingrelated information in a cost-effective and time saving manner. All CDCAAS softwarewill be designed, implemented, purchased, or subcontracted during the life of thisproject. This project will extend the existing System XYZ software packages dividedinto various methods of implementation.

    Three packages will be Commercial-Off-The-Shelf (COTS) products. Three packageswill leverage reusable components as building blocks. Five packages will be customdesigned and developed. One of the five custom packages will be outsourced to IvanIndustries. All sub-phases of the project including requirements, preliminary anddetailed design, code, and unit testing will be conducted during the CDCAAS project.Subsequently, the CDCAAS project will conduct alpha and beta tests and lead therollout of the software into production. Installation and user-training will be providedby the CDCAAS project. Additionally, this project will provide 24 hour help-deskservice and support for a six-month maintenance period after completing installationsat each site.

    Exclusions to the project include any connectivity or supporting hardware installationsand delivery that are necessary for the CDCAAS software to function. Other notableexclusions include: Multi-Language Translation Packages, ability to edit CDCAASDocuments using other software, staffing support for Ivan industries, and extended

    support and maintenance plans.CDCAAS Hardware (Notebook Configuration):

    Two Universal 2009-B microprocessors, 3.4 GHz 20.1 inch display A three-button mouse point device 4 GB of main memory (SDRAM) 16 MB Video RAM 320 GB primary hard drive DVD/R/RW AMD CD-RW Combo Drive A 100 MB ZIP drive Integrated 2.0 MP camera Printer port Asynchronous port Integrated 802.11 g wireless LAN Four USB ports 1394/FireWire connector A LAN interface card

  • 8/3/2019 CDCAAS-SPMP-1.0

    10/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    x

    A 56,000 bps capable fax/modem Anti-virus/security suite Video Card

    CDCAAS Notebook Bundled Devices Speakers Head phones Laser printer 9-cell lithium ion battery MP3 30 GB audio/video player A Bar Code scanner Personal Assistant Device (416 megahertz, 1 GB RAM) 48-bit Color Flatbed Scanner (2400 dpi optical resolution) System ABC enhanced keyboard

    A CRT monitor (1,280 x 1,024 non-interlaced; high resolution; bit-mapped; 21inch color display)

    Port replicator A stand for the CRT monitor Power connector Digital camcorder Internal Speakers Wireless Digital Phone with voice mail messaging and internet service

    CDCAAS Application Packages:

    CDCAAS Database Management System CDCAAS Spreadsheet CDCAAS Requirements and configuration Management CDCAAS Secure Communication CDCAAS Graphics Presentation CDCAAS Word Processor CDCAAS Project Management CDCAAS GPS Navigation CDCAAS Compiler CDCAAS Debugger & Test CDCAAS Electronic Inventory and Tracking

  • 8/3/2019 CDCAAS-SPMP-1.0

    11/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    xi

    Table of ContentsRevisions ........................................................................................... iiPreface ............................................................................................. iiiAbstract ............................................................................................ ivProject Charter .................................................................................... vInitial Cost Estimate for CDCAAS .............................................................. viiProject Scope ...................................................................................... ixTable of Contents ................................................................................. xiTable of Figures .................................................................................. xivIndex of Tables .................................................................................. xvii1. Introduction ..................................................................................... 1

    1.1. Project Overview .......................................................................... 11.1.1. Project Description ................................................................... 11.1.2. Product Summary ................................................................... 10

    1.2 Project Deliverables ..................................................................... 151.2.1 Software Applications, Computer Software Configuration Item (CSCI) ...... 151.2.2 Delivery Locations and Quantities ................................................ 161.2.3 Documentation....................................................................... 171.2.4 Delivery Customer Acceptance .................................................... 17

    1.3 Evolution of the Software Project Management Plan ............................... 181.4 Reference Materials ...................................................................... 191.5 Definitions and Acronyms ............................................................... 19

    1.5.1 Definitions ............................................................................ 191.5.2 Acronyms ............................................................................. 22

    2. Project Organization ......................................................................... 272.1 Process Model ............................................................................. 27

    2.1.1 Process Milestones .................................................................. 272.1.2 Baselines .............................................................................. 302.1.3 Reviews ............................................................................... 30

    2.2 Organizational Structure ................................................................ 332.3 Organization Boundaries and Interfaces .............................................. 402.4 Project Responsibilities.................................................................. 42

    2.4.1 Project Manager ..................................................................... 422.4.2 Assistant Project Manager .......................................................... 422.4.3 Chief Software Developer .......................................................... 422.4.4 Administrative Assistant ............................................................ 422.4.5 System Engineer/Analyst ........................................................... 422.4.6 Requirements Analysts.............................................................. 422.4.7 Technical Team Leader ............................................................. 422.4.8 Software Developers ................................................................ 422.4.9 Testers ................................................................................ 432.4.10 Help Desk Technician .............................................................. 432.4.11 Project Specialists ................................................................. 43

  • 8/3/2019 CDCAAS-SPMP-1.0

    12/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    xii

    3. Managerial Process ........................................................................... 573.1 Management Objectives & Priorities ................................................. 57

    3.1.1 Goals & Objectives .................................................................. 573.1 Management Objectives & Priorities ................................................. 58

    3.1.1 Goals & Objectives .................................................................. 583.1.2 Management Priorities .............................................................. 603.1.2 Management Priorities .............................................................. 61

    3.2 Assumptions, Dependencies and Constraints ......................................... 623.2.1 Assumptions .......................................................................... 633.2.2. Dependencies ....................................................................... 633.2.3 Constraints ........................................................................... 63

    3.2 Assumptions, Dependencies and Constraints ......................................... 643.2.1 Assumptions .......................................................................... 643.2.2. Dependencies ....................................................................... 643.2.3 Constraints ........................................................................... 65

    3.3 Risk Management ......................................................................... 653.4 Monitoring and Controlling Mechanism ................................................ 67

    3.4.1 Schedule .............................................................................. 673.4.2 Budget ................................................................................ 693.4.3 Quality Assurance ................................................................... 703.4.4 Productivity .......................................................................... 723.4.6 Measures .............................................................................. 76

    3.5 Staffing Plan .............................................................................. 793.5.1 Obtaining ............................................................................. 793.5.2 Training ............................................................................... 793.5.3 Retaining.............................................................................. 793.5.4 Phasing out of personnel ........................................................... 803.5.5 Staff Expertise ....................................................................... 96

    4. Technical Process ............................................................................. 984.1 Methods, Tools & Techniques ........................................................... 984.2 Software Documentation ............................................................... 1014.3 Project Support Functions ............................................................. 105

    4.3.1 Configuration Management ....................................................... 1054.3.2 Quality Assurance .................................................................. 1074.3.3 Verification and Validation ....................................................... 1084.3.4 Test Evaluation ..................................................................... 1094.3.4 Test and Evaluation ................................................................ 109

    5. Work Packages, Schedule, and Budget ................................................... 1105.1 Work Packages ........................................................................... 110

    5.1.1 Work Breakdown Structure ....................................................... 1105.1.2 Work Package Specifications ..................................................... 116

    5.2 Dependencies ............................................................................ 1185.3 Resource Requirement .................................................................. 1365.3 Resource Estimate ....................................................................... 145

  • 8/3/2019 CDCAAS-SPMP-1.0

    13/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    xiii

    5.4 Budget and Resource Allocation ....................................................... 1595.5 Schedule .................................................................................. 162

    Additional Components ........................................................................ 1721.1. Subcontracting Process ................................................................ 172

    1.1.1 Selection of Subcontractors ....................................................... 1721.1.2. Coordinating with Subcontractors .............................................. 1741.1.3. Integrating with Subcontractors ................................................. 1741.1.4. Controlling Subcontractors ....................................................... 175

    2.1. Security Considerations ................................................................ 1753.1. Training Plans ........................................................................... 1764.1. Alpha & Beta Test Plan ................................................................ 176

    4.1.1. Alpha Testing ...................................................................... 1764.1.2. Beta Testing ........................................................................ 178

    5.1. Installation & Training Plans .......................................................... 1786.1. Post Deployment Support Procedures ............................................... 179

    Index .............................................................................................. 180Appendix I ........................................................................................... 1

    Detailed Resource Estimate Spreadsheet (23 columns plus intermediatecalculations) attached. ....................................................................... 1

    Appendix II .......................................................................................... 1Detailed Resource Estimate Spreadsheet with formulas revealed--attached. ......... 1

    Appendix III ......................................................................................... 1Work Package Specifications .................................................................. 1

    Configuration Management ................................................................. 1Communication ............................................................................... 2Graphic Presentation ........................................................................ 3Word Processing .............................................................................. 4Project Management ......................................................................... 5Global Positioning System Gps .............................................................. 6Compile/Link/Runtime ...................................................................... 7Language Independent Debugging And Testing .......................................... 8Electronic Inventory and Tracking ......................................................... 9

    Binder Back Cover ............................................................................... 10

  • 8/3/2019 CDCAAS-SPMP-1.0

    14/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    xiv

    Table of FiguresFigure 1: Operational Architecture ............................................................. 3Figure 2: Network Architecture .................................................................. 4Figure 3: Product Technical Architecture ...................................................... 5Figure 4: Software Architecture ................................................................. 6Figure 5: Notebook Hardware Architecture .................................................... 7Figure 6: Standalone Environment .............................................................. 8Figure 7: Mobile Client/Server Architecture Only ............................................ 8Figure 8: Client/Server Architecture with Central Location ................................ 9Figure 9: Activities, Benchmarks and Success Indicators .................................. 30Figure 10: CDCAAS Organization Chart ....................................................... 34Figure 11: Software Division Organization Chart ............................................ 35Figure 12: CDCAAS Project Organization Chart .............................................. 36Figure 13: Analysis Design and Development Team ......................................... 38Figure 14: CDCAAS Project Team Structure .................................................. 39Figure 15: Program Manager Organizational Interfaces .................................... 40Figure 16: Project Manager Organizational Interfaces ..................................... 41Figure 17: Responsibility Matrix Summary ................................................... 44Figure 18: Total Project Responsibility Matrix .............................................. 45Figure 19: Database Management System Package Responsibility Matrix ............... 46Figure 20: Compiler Package Staffing ........................................................ 81Figure 21: GPS Navigation Package Staffing ................................................. 83Figure 22: Graphics Package Staffing ......................................................... 87Figure 23: Total Project Staffing Chart ....................................................... 89Figure 24: Total Project Staffing by Package ................................................ 91

    Figure 26: Document Production Process Flow Chart ..................................... 104Figure 27: Work Breakdown Structure (Overall) ........................................... 110Figure 28: Figure 27: Work Breakdown Structure (Secure Communication) ........... 111Figure 29: WBS GPS Navigation ............................................................... 111Figure 30: WBS Database Management System ............................................. 112Figure 31: WBS Spreadsheet .................................................................. 113Figure 32: Dependencies (Part 1) ............................................................ 118Figure 33: Dependencies (Part 2) ............................................................ 119Figure 34: Dependencies (Part 3) ............................................................ 120Figure 35: Dependencies (Part 4) ............................................................ 121Figure 36: Dependencies (Part 5) ............................................................ 122

    Figure 37: Dependencies (Part 6) ............................................................ 123Figure 38: Dependencies (Part 7) ............................................................ 124Figure 39: Dependencies (Part 8) ............................................................ 125Figure 40: Dependencies (Part 9) ............................................................ 126Figure 41: Phase Distribution (Project Overall) ............................................ 127Figure 42: : Phase Distribution (Project Plans & Requirements)......................... 127Figure 43: : Phase Distribution (Project Programming) ................................... 128

  • 8/3/2019 CDCAAS-SPMP-1.0

    15/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    xv

    Figure 44: Distribution (Project Product Design) ........................................... 128Figure 45: Phase Distribution (Project Integration & Test) ............................... 129Figure 46: Project Maintenance (Part 1) .................................................... 129Figure 47: Project Maintenance (Part 2) .................................................... 130Figure 48: Project Maintenance (Part 3) .................................................... 130Figure 49: Project Maintenance (Part 4) .................................................... 131Figure 50: Module Overall (Database Management) ....................................... 131Figure 51: Module Plans & Requirements (Database Management) ..................... 132Figure 52: Module Programming (Database Management) ................................ 132Figure 53: Module Product Design (Database Management) .............................. 133Figure 54: Module Integration & Test (Database Management) .......................... 133Figure 55: Module Maintenance (Database Management Part 1) ....................... 134Figure 56: Module Maintenance (Database Management Part 2) ....................... 134Figure 57: Module Maintenance (Database Management Part 3) ....................... 135Figure 58: Module Maintenance (Database Management Part 4) ....................... 135Figure 59: Resource Loading Chart 1......................................................... 136Figure 60: Resource Loading Chart 2......................................................... 136Figure 61: Resource Loading Chart 3......................................................... 137Figure 62: Resource Loading Chart 4......................................................... 137Figure 63: Resource Loading Chart 5......................................................... 138Figure 64: Resource Loading Chart 6......................................................... 138Figure 65: Resource Loading Chart 7......................................................... 139Figure 66: Resource Loading Chart 8......................................................... 139Figure 67: Resource Loading Chart 9......................................................... 140Figure 68: Resource Loading Chart 10 ....................................................... 140Figure 69: Resource Loading Chart 11 ....................................................... 141Figure 70: Resource Loading Chart 12 ....................................................... 141Figure 71: Resource Loading Chart 13 ....................................................... 142Figure 72: Resource Loading Chart 14 ....................................................... 142Figure 73: Resource Loading Chart 15 ....................................................... 143Figure 74: Resource Work Summary Report Chart ......................................... 143Figure 75: Resource Work Availability Report Chart ....................................... 144Figure 76: Software Productivity (SLOC/SM) by Application Domains .................. 146Figure 77: COCOMO Summary Screen ........................................................ 149Figure 78: COCOMO Product Parameters .................................................... 150Figure 79: COCOMO Platform Parameters ................................................... 150Figure 80: COCOMO Personnel Parameters ................................................. 151Figure 81: COCOMO Project Parameters .................................................... 151Figure 82: COCOMO Scale Parameters ....................................................... 152Figure 83: COCOMO Equation Parameters ................................................... 152Figure 84: COCOMO Phase Distribution-Project Overall................................... 153Figure 85: COCOMO Phase Distribution-Project Plans & Requirements ................. 153Figure 86: COCOMO Phase Distribution-Project Programming ........................... 154Figure 87: COCOMO Phase Distribution-Project Product Design ......................... 154

  • 8/3/2019 CDCAAS-SPMP-1.0

    16/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    xvi

    Figure 88: COCOMO Phase Distribution-Project Integration & Test ..................... 155Figure 89: Resource Estimate Spreadsheet Part 1 ......................................... 157Figure 90: Resource Estimate Spreadsheet Part 2 ......................................... 158Figure 91: CDCAAS System Master Schedule ................................................ 162Figure 92: Debugger & Test Schedule ........................................................ 163Figure 93: CDCAAS Electronic Inventory & Tracking/Custom Development DetailedSchedule ......................................................................................... 164Figure 94: CDCAAS COTS Development Detailed Schedule ............................... 165

  • 8/3/2019 CDCAAS-SPMP-1.0

    17/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Kenneth Nidiffer

    xvii

    Index of TablesTable 1: Project Sponsor Information .......................................................... vTable 2: Major Deliverables ..................................................................... viTable 3: Key Staffing Requirements ........................................................... viTable 4: Other Constraints and Assumptions ................................................. viTable 5-Initial Cost Estimate for CDCAAS ................................................... viiiTable 6: Profile of Typical Product Users .................................................... 13Table 7: Software Applications, Computer Software Configuration Item (CSCI) ....... 16Table 8: Delivery Locations and Quantities .................................................. 17Table 9: Delivered Documentation ............................................................ 17Table 10: Spreadsheet Package Responsibility Matrix ...................................... 47Table 11: Requirements & Configurations Package Responsibility Matrix ............... 48Table 12: Secure Communications Package Responsibility Matrix ........................ 49Table 13: Graphics Extension Package Responsibility Matrix .............................. 50Table 14: Word Processor Package Responsibility Matrix .................................. 51Table 15: Project Management Package Responsibility Matrix ........................... 52Table 16: GPS Navigation Package Responsibility Matrix .................................. 53Table 17: Compiler Package Responsibility Matrix .......................................... 54Table 18: Debugger and Test Package Responsibility Matrix .............................. 55Table 19: Electronic Inventory and Tracking Package Responsibility Matrix ............ 56Table 20: Risk Management Description and Mitigation Strategies ....................... 67Table 21: Compiler Package Staffing ......................................................... 82Table 22: GPS Navigation Package Staffing .................................................. 84Table 23: Secure Communication Package Staffing ........................................ 86Table 24: Graphics Package Staffing .......................................................... 88

    Table 25: Total Project Staffing ............................................................... 90Table 25: Total Project Staffing by Package................................................. 92Table 27: Document Table .................................................................... 104Table 28: Work Breakdown Structure ........................................................ 115Table 29: Resource Estimate-Method 1 ...................................................... 147Table 30: Resource Estimate-Method 2 ...................................................... 148Table 31: Resource Estimate-Method 3 ...................................................... 148Table 32: Budget and Resource Allocation .................................................. 161Table 33: Current Price-Breakeven Table ................................................... 168Table 34: Decreased Price Breakeven Table ................................................ 169Table 35: Increased Price-Breakeven Table ................................................ 170

    Table 36: Optimum Price-Breakeven Table ................................................. 171Table 37: Training Plans ....................................................................... 176

  • 8/3/2019 CDCAAS-SPMP-1.0

    18/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    1

    1. Introduction

    1.1. Project Overview1.1.1. Project Description

    Government Law Enforcement Agencies face new challenges everyday and tooutsmart these challenges their dependency on technology is growing proportionally.Crime Data Collection, Aggregation and Assimilation System (CDCAAS) are a tooldesigned with enhanced functionality which will give these agencies an upperhand against Criminals. Our objective is to come up with a unified tool that will havethe capability to work of different platforms, understand all secure formats, andcommunicate over broad range of medium without compromising on the stringentlevel of security that is specific to the government agencies and other corporations.

    CDCAAS will provide the corporate user with a pool of utilities that enables to takecontrol of various technical and managerial aspects of the functionality, informationcontrol, data abstraction, easy access to information and scheduling. The system willalso have the capability to be customized depending upon the changing corporateneeds. The outcome of the project will be a unified system providing the governmentagencies with all the information ever collected for the entity under the scanner.

    Our goal of delivering the project on time with the committed capabilities, will writea new chapter of success for us. Capabilities delivered will include access control,identification, and data mining.

    Delivery of the system capabilities to the 700 advanced orders and subsequent orders

    will give the corporation a foot hold with financial stability. In addition, for each ofthe sites that have preordered systems we must install at least 50% of the systems andprovide training on our application packages for 50 users.

    The enhancement for this application will involve producing additions to the followingpackages:

    1. CDCAAS Database Management System - Custom Developed

    2. CDCAAS Spreadsheet -COTS

    3. CDCAAS Requirements and Configuration Management - Reuse

    4. CDCAAS Secure Communication - Custom Developed

    5. CDCAAS Graphics Presentation - COTS

    6. CDCAAS Word Processor - Reuse

    7. CDCAAS Project Management - COTS

    8. CDCAAS GPS Navigation - Outsourced to Ivan Industries

    9. CDCAAS Compiler - Reuse

  • 8/3/2019 CDCAAS-SPMP-1.0

    19/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    2

    10.CDCAAS Debugger & Test - Custom Developed

    11.CDCAAS Electronic Inventory and Tracking - Custom Developed

    This system is designed to be marketable to a wide variety of clients as follows:

    It can be used at all levels of government from the federal government levelorganizations such as DHS, FBI, CIA and DOD all the way down to local lawenforcement level.

    It can be customized for implementation in any corporation whether big orsmall to provide a one stop resource to manage information access and control.

    Wide customization capability of the CDCAAS system in addition to providingcontrol, abstraction, access, and management of information makes it a globalperformer, and should make us a preferred choice the world over in the yearsto come.

    The Department of Defense provides a set of guidelines known as SecurityTechnical Implementation Guides (STIG) that provide a security configurationbaseline; systems must meet to be used within the Department of Defense. Byfollowing these guidelines less time and money will be required for integrationby our team and by our federal customers, increasing the competitiveness andmarketability of our product.

  • 8/3/2019 CDCAAS-SPMP-1.0

    20/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    3

    Figure 1: Operational Architecture

  • 8/3/2019 CDCAAS-SPMP-1.0

    21/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    4

    Figure 2: Network Architecture

  • 8/3/2019 CDCAAS-SPMP-1.0

    22/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    5

    Figure 3: Product Technical Architecture

  • 8/3/2019 CDCAAS-SPMP-1.0

    23/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    6

    Figure 4: Software Architecture

  • 8/3/2019 CDCAAS-SPMP-1.0

    24/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    7

    Figure 5: Notebook Hardware Architecture

  • 8/3/2019 CDCAAS-SPMP-1.0

    25/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    8

    Figure 6: Standalone Environment

    Figure 7: Mobile Client/Server Architecture Only

  • 8/3/2019 CDCAAS-SPMP-1.0

    26/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    9

    Figure 8: Client/Server Architecture with Central Location

  • 8/3/2019 CDCAAS-SPMP-1.0

    27/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    10

    1.1.2. Product Summary

    1.1.2.1. Product OverviewThe Crime Data Collection, Aggregation and Assimilation System (CSCAAS) isa criminals' data assimilation system that is flexible enough for Homeland Security,TSA, Corporate America, and law enforcement from the local to international levels.This tool collects the information about the criminal from the user and aggregates andassimilates the information from various databases and resources, and presentsaccurate information to the users. This will allow organizations an efficient way to geta more holistic view of criminal's information it can act on more rapidly. The mostimportant aspect of the system is to provide faster and higher rates of case-closingthrough more efficient gathering and analysis of crime related data.

    The system will have the capability to study the criminal's pattern based on the dataavailable and present the user with highly graphical reports within a click of a button.The system will also have the ability to facilitate reporting on query by date, timeand location. The system is also capable of generating alerts when new data; for thequeries already processed; is fed to the database. These alerts can be sent throughmultiple channels including email and text messages to mobile devices.

    The goal of CDCAAS is to provide a convenient and robust user interface to allow theusers to enter the information pertaining to the criminal, this interface will retrievethe information from various databases i.e. Fingerprint Database, DNA, DMV andother. This system will accommodate increased information processing and sharingdemands in support of anti-terrorism. This initiative will provide new services to the

    state, local and federal partners.The implementation of CDCAAS should revolutionize the security and general crimedata collection industry. The system should reduce the monetary costs, and greatlyreduce the time involved in identifying individuals for security or other purposes. Thesystem also has the potential to reduce the risks to innocent civilians by allowingfaster identification of threats or the risk to corporations of losing company secretsdue to unauthorized individuals entering sensitive areas of the company.

    The CDCAAS system will be developed by extending the System CDC softwarepackages to support:

    Distributed Data Access with Access Control Information Exchange Management Interactive Input System Pattern Study and Reporting

    Each of these functions will be built using the following packages:

    General Purpose Database Package

  • 8/3/2019 CDCAAS-SPMP-1.0

    28/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    11

    Spreadsheet Package Requirements and Configuration Management Package Secure Communication Package

    Graphics Presentation Package Word Processing Package Project Management Package GPS Navigation Package Compile/Link/Runtime Packages for BASIC, C, and C++ Language Independent Debugging and Testing Package Electronic Inventory and Tracking Package

    Database Package: This package will provide the user not only with the bare bonefunctionality of designing tables, but also allow advanced users to import/export datain different files and formats. Package being supported by a high end graphical

    interface will allow the users to manage the database within fraction of the time astaken by present day systems. The package will be able to handle concurrent userconnections whether local or remote. This is OLE, ODBC and InnoDB compliant.

    Spreadsheet Package: Provide a custom 'spreadsheet wizard' which will allow dataanalysts or other users the customize reports for information updates, identificationand alerts in a generated reports. This package must be able to handle a minimum ofone hundred concurrent user connections and must be OLE and ODBC compliant.

    Requirements and Configuration Management Package: Its ability to manageinformation scheduling, and providing contact information for users such as securitypersonnel and points of contact eliminates the need of any other application to be

    used in conjuncture. This must be OLE, ODBC and InnoDB compliant.Secure Communications Package: Package has been designed to allow securetransfer of data packets from the input devices to the system and betweensystems. Keeping in mind the increase in security vulnerabilities every single day, thepackage has been fitted with self updating mechanism which will keep a tab on newthreats and update itself to counter them.

    Information Exchange Management Package: This package enables the user to havea single point of resource to access all information available. It acts as a bridgebetween all the databases and allows conversion of one data format to another.Thismust be OLE, ODBC and InnoDB compliant.

    Graphics Presentation Package: High end graphical interface enables the user tospend less time on configuration and handling. The package is also capable ofpresenting the generated reports in different graphical formats.

    Word Processing Package: Provides generic macros and custom 'word processorwizard' which will allow the user to create custom and preformatted reports based ondata and logs in the system.

  • 8/3/2019 CDCAAS-SPMP-1.0

    29/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    12

    Project Management Package: This provides project managers with the ability togenerate real time information in the form of resource estimation and usage reports.This also allows them to generate other information such as WBS (Work breakdown

    Structures), CPM (Critical Path Method), PERT (Program Evaluation and ReviewTechnique) and Gantt charts, etc available and used to develop CDCAAS. This must beOLE, ODBC and InnoDB compliant

    GPS Navigation Package: Enables the dependent modules to study the patternsgenerated based on fetched information and then present in various graphicalformats. This package must be OLE, ODBC and InnoDB compliant.

    Compile Link and Runtime Package: Provides the necessary additional softwarelibraries to perform executable building functions from C, C++, Basic ProgrammingLanguages to Java and Flash. Also provides additional libraries for utilizing the securecommunications package to communicate over the network.

    Language Independent Debugging and Testing Package: Provides wizards to performusability and functionality testing through automation scripts. This also gives SystemAdministrators the ability to debug problems on the fly in production systemsdeployed in the field.

    Electronic Inventory and Tracking Package: User will be able to track hardware andany other movable equipment. The user can log issues, comments and will bepermitted to generate any number of tracking statuses to be used.

    1.1.2.2 Profile of Typical Product Users

    The following table lists out the categories of system users, a brief description of

    each and the knowledge and skill level expected for them.Profile of Typical Product Users

    SystemAdministrators

    Monitor and maintain the system. An individual whoconfigures the CDCAAS system by setting system datavalidation and searching policies, assigning and revokinguser authorizations , adding and removing lawenforcement agencies , among other duties.

    Data Entry Person Have the ability to enter new and update existinginformation. For example, these could be security orhuman resources personnel adding individual profiles to

    the system. It is assumed that these users will have atleast an intermediate level of computer knowledge andskill.

    InformationAssurance Monitor

    Monitor user access and system modification logs. It isassumed that these users will have at least a basic levelof computer knowledge and skill.

  • 8/3/2019 CDCAAS-SPMP-1.0

    30/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    13

    Profile of Typical Product UsersData Analysts An individual who has restricted ability to change

    existing data. An analyst enters and modifies An

    analysts enters and modifies biometrics and DNA data.This role is usually performed by a role is usuallyperformed by a forensic biologist.

    Law EnforcementAgency

    Perform real-time search to solve the criminal case.

    Table 6: Profile of Typical Product Users

    1.1.2.3 Development Environment

    The CDCAAS system will be developed with system XYZ notebook computer withfollowing configuration:

    CDCAAS Hardware (Notebook Configuration):

    Two Universal 2009-B microprocessors, 3.4 GHz 20.1 inch display A three-button mouse point device 4 GB of main memory (SDRAM) 16 MB Video RAM 320 GB primary hard drive DVD/R/RW AMD CD-RW Combo Drive A 100 MB ZIP drive Integrated 2.0 MP camera Printer port Asynchronous port Integrated 802.11 g wireless LAN Four USB ports 1394/FireWire connector A LAN interface card A 56,000 bps capable fax/modem Anti-virus/security suite Video card

    CDCAAS Notebook Bundled Devices:

    Speakers Head phones Laser printer 9-cell lithium ion battery MP-3 30 GB audio/video player A Bar Code scanner

  • 8/3/2019 CDCAAS-SPMP-1.0

    31/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    14

    Personal Assistant Device (416 megahertz, I GB RAM) 48-bit Color Flatbed Scanner (2400 dpi optical resolution) System ABC enhanced keyboard

    A CRT monitor (1,280 x 1,024 non-interlaced; high resolution; bit-mapped; 21inch color display)

    Port replicator A stand for the CRT monitor Power connector Digital camcorder Internal Speakers Wireless Digital Phone with voice mail messaging and Internet service

    1.1.2.4 Priorities and Constraints

    Most Important Product features: Collect the information from the user and search all the available databases

    which have criminals biometric information available and retrieve theinformation to the user in a fast and efficient way.

    Ability to be a centralized place for data retrieval.

    Providing access to the authorized users and also providing security, dataintegrity and user authentication to the users.

    Environmental Conditions and Constraints:

    The system should be able to handle a high user friendly interface with

    available hardware and software resources.

    The system must operate in available network.

    Working prototypes are required to show demos to customers on a timely basisregarding the progress of the project.

    1.1.2.5. Risk Factors

    In managing the areas of risk from product planning to closeout, the followingactivities are ensured by the Product Manager:

    Areas of risk are identified and maintained

    Factors that contribute to the potential occurrence of each risk are identified

    Specific tasks for monitoring identified risk factors and for reducing thepotential occurrences of each risk are documented

    Appropriate mitigation plans for each area of risk are identified

    Risk items, risk status, and risk mitigation plans are documented and reviewedby product and senior management on a regular basis

  • 8/3/2019 CDCAAS-SPMP-1.0

    32/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    15

    The following risk factors are only those assumed at the time of current versiondevelopment. The list will be continually updated

    Inadequate requirements (e.g., unstable, conflicting, poorly defined)

    Scope creep (e.g., continuing stream of additional requirements)

    Unrealistic or dynamic schedules and budgets

    Shortfalls in qualified personnel (e.g., unavailable when needed, novice whenexpert needed)

    Delay in the procurement of software resources critical to project success

    Budget Overrun.

    Shortfalls in externally performed tasks (e.g., subcontractor failure to deliver,late delivery)

    Shortfalls in externally furnished components (e.g., COTS software, hardwarecomponents)

    Shortfalls in performance capability (e.g., inability of databases to scale-up)

    Risks for each task are documented in the monthly Program Management Reviews.The risk tables include the identified risk; a qualitative assessment of whether therisk is considered low, medium, or high based on its likelihood of occurrence andimpact on the project; mitigation activities; and, whether the risk has changed statussince it was reviewed at the previous PMR. All participants in the PMR are responsiblefor reviewing the risks in their functional areas and updating them as necessary.

    1.2 Project Deliverables

    1.2.1 Software Applications, Computer Software Configuration Item(CSCI)

    CDCAASSoftware

    Product Name Code FunctionAcquisition

    Type

    Applicationand

    Documentationdelivery date

    DatabaseManagementSystem

    (CSCI-08-NO1) Stores dataindividuals andhardware

    Custom 28 January2010

    Spreadsheet (CSCI-08-N02) View and createspreadsheets

    COTS 28 January2010

  • 8/3/2019 CDCAAS-SPMP-1.0

    33/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    16

    CDCAASSoftware

    Product Name Code Function

    Acquisition

    Type

    Applicationand

    Documentation

    delivery dateRequirementsandConfigurationManagement

    (CSCI-08-N03) Email andappointmentmanagement

    Reuse 28 January2010

    SecureCommunication

    (CSCI-08-N04) Facilitate secureconnection to remotenetworks

    Custom 28 January2010

    GraphicsPresentation

    (CSCI-08-N05) Generate and viewgraphical reports

    COTS 28 January2010

    Word Processor (CSCI-08-N06) Generate and view

    written reports

    Reuse 28 January

    2010ProjectManagement

    (CSCI-08-N07) Generate and controlprogram plans

    COTS 28 January2010

    GPS Navigation (CSCI-08-N08) Monitor and trackhardware andindividuals

    Outsourcedto IvanIndustries

    28 January2010

    Compiler (CSCI-08-N09) Develop CDCAAS add-ons and plug-ins

    Reuse 28 January2010

    Debugger andTest

    (CSCI-08-N10) Debug and testCDCAAS add-ons andplug-ins

    Custom 28 January2010

    ElectronicInventory andTracking

    (CSCI-08-N11) Inventory and trackhardware andindividuals

    Custom 28 January2010

    Table 7: Software Applications, Computer Software Configuration Item (CSCI)

    1.2.2 Delivery Locations and Quantities

    We have received advanced orders for 700 systems to be deployed to the sites listed nTable 11 below. At each site, we are required to install at least 50% of the systemsand provide training on our application packages for 50 users.

  • 8/3/2019 CDCAAS-SPMP-1.0

    34/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    17

    Delivery Locations and Quantities

    Location Quantity Success Metric

    Norfolk, VA 100

    Install at least 50%of systems orderedand train 50 users

    Jacksonville, FL 100Memphis, TN 100

    Dallas, TX 50

    San Diego, CA 100

    Mishawaka, In 150

    Boston, MA 50

    Mobile, AL 50

    Total 700

    Table 8: Delivery Locations and Quantities

    1.2.3 Documentation

    Document COTS Custom Re-Use Out-SourceRequirementsSpecification

    X X

    Detailed DesignDocuments

    X X

    Documented Source Code X X XTest Plan and Test Cases X X XTest Results (includingperformance benchmarks)

    X X X

    Traceability Matrices X X XUser Manuals X X X XTraining Manuals(including a GettingStarted User's Guide)

    X X X X

    Installation Instructions X X X XMaintenance Guide X X X XVersion Description

    DocumentX X X

    Table 9: Delivered Documentation

    1.2.4 Delivery Customer Acceptance

    Applications with corresponding documentation will be developed iteratively with aseries of internal product releases, to be reviewed by the customer, all local andstate government agencies, during the next 24 months, with a full set of packages

  • 8/3/2019 CDCAAS-SPMP-1.0

    35/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    18

    available in final version for alpha testing on August 29, 2008. COTS documentationwill be provided in the form it is available from the vendor(s).

    The Requirements Specification will detail how the COTS applications are expected to

    work based on open source documented vendor claims and how they will beintegrated in the extension to CDCAAS. Change pages will be made for reusedocumentation only for required changes made in the following applications: CSCI-08-N03, CSCI-08-N06, and CSCI-08-N09. Outsource application and documentation forCSCI-08-N08 will be provided as available during the series of internal productreleases.

    During the two-month beta test, all applications and documentation will be subject tosigned-off customer acceptance based on the set of test performance benchmarkscorresponding to the system requirements. The procedures for unmet performancebenchmarks will be detailed in the Software Project Management Plan to achievecustomer acceptance by the subsequent two month customer roll-out at theremaining customer sites.

    Any unmet critical performance benchmarks after customer roll-out will be handledon a customer assigned priority basis with the appropriate expertise (with ourcompany working on custom and reuse and our company integrating COTS andoutsourced software) during the six-month maintenance period.

    1.3 Evolution of the Software Project Management Plan

    Date Deliverable

    February 11, 2008 Stage I -Project Definition, Project Charter, Product & Project Summaries

    February 18, 2008Stage 2 -Management Objectives and Priorities, Assumptions, Dependenciesand Constraints, Resource Estimate, Schedule Estimate

    February 25, 2008Stage 3 -Process Model, Organizational Structure, Organizational Interfaces,Project Responsibilities

    March 17, 2008Stage 4 -Technical Methods, Tools, and Techniques, Software Documentation,Project Support Functions, Staffing Plan

    March 31 , 2008 Stage 5 -Monitoring and Controlling Mechanisms

    April 14, 2008Stage 6 -Work Packages, Dependencies, Resource Requirements, Budget andResource Allocation, Schedule

    April 21 ,2008 Stage 7 -Risk Management, Reference Materials, Definitions and Acronyms

    May 5, 2008 Stage 8 -Additional Components, Index, Appendices, CDCAAS End

    Table 10: Evolution of the Software Project Management Plan

  • 8/3/2019 CDCAAS-SPMP-1.0

    36/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    19

    1.4 Reference Materials

    The following documents were used as references when creating this software projectmanagement plan.

    "COCOMO II Model Definition Manual", Version 1.4, University of SouthernCalifornia.

    "CMMI for Development, Version 1.2", CMMI-DEV, V1.2, CMU/SEI-2006-TR-008,ESC-TR-2006-008, Carnegie Mellon University Software Engineering Institute.

    "Database Security Technical Implementation Guide Version 8.1 ", September192007, Defense Information Systems Agency.

    "IEEE standard for software project management plans", IEEE Std 1058.1-1987,Computer Society.

    "Introduction to Software Risk Management", Carnegie Mellon UniversitySoftware Engineering Institute.

    John/Jane Doe Manager, "Applications Software for System XYZ and Life-CycleSystem Delivery Expectations", January 28 2008, Applications SoftwareDevelopment.

    Kenneth E. Nidiffer, "SWE 625 Course Notes", January 2008, George MasonUniversity.

    Richard E. Fairley, "A Guide for Preparing Software Project Management Plans",November 1986, Wang Institute Tech Report TR-86-14.

    "Secure Remote Computing Security Technical Implementation Guide Version1.2", August 10 2005, Defense Information Systems Agency.

    "Sharing Peripherals Across the Network Security Technical ImplementationGuide Version 1.1", July 28 2005, Defense Information Systems Agency.

    "USC COCOMOII.1997 Reference Manual", 1997, University of SouthernCalifornia.

    "USC COCOMO 11.1999.0 Software", [http://sunset.usc.eduJresearch/COCOMOIII], USCCSE Center for Software Engineering.

    "Wireless Security Technical Implementation Guide Version 5.2' November 15

    2007, Defense Information Systems Agency.

    1.5 Definitions and Acronyms

    1.5.1 Definitions

    Alpha Test In-house testing of pre-production products and eliminate most obviousdesign defects or deficiencies, either in a laboratory setting or in some part of thedeveloping firms regular operations.

  • 8/3/2019 CDCAAS-SPMP-1.0

    37/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    20

    Baseline A specification or product that has been formally reviewed and agreedupon, that thereafter serves as the basis for further development and that can bechanged only through formal change control procedure.

    Beta Test In software development, a beta test is the second phase of softwaretesting in which a sampling of the intended audience tries the product out. Betatesting is considered "pre-release testing."

    Capability Maturity Model (CMM) in software engineering is a model of the maturityof the capability of certain business processes. A maturity model can be described asa structured collection of elements that describe certain aspects of maturity in anorganization, and aids in the definition and understanding of an organization'sprocesses.

    Capability Maturity Model Integration (CMMI) in software engineering andorganizational development is a process improvement approach, which wants to

    provide organizations with the essential elements of effective process improvement.It can be used to guide process improvement across a project, a division, or an entireorganization.

    Constructive Cost Model (COCOMO) is an algorithmic Software Cost EstimationModel developed by Barry Boehm. The model uses a basic regression formula, withparameters that are derived from historical project data and current projectcharacteristics.

    Configuration Management The process of identifying and defining the deliverableproduct set in a system, controlling the release and change of these items throughoutthe system life cycle, recording and reporting the status of product items and change

    request. Such information typically includes the versions and updates that have beenapplied to installed software packages and the locations and network addresses ofhardware devices.

    Cost Calculated from the time variable in developing an internal project bymultiplying time with the cost of the team members involved. When hiring anindependent consultant for a project, cost will typically be determined by theconsultant or firms hourly rate multiplied by an estimated time to complete.

    Commercial Off-The-Shelf (COTS) software or hardware products, which are ready-made and available for sale to the general public.

    Detailed Design Process of refining and expanding the preliminary design of a

    system or component to the extent that the design is sufficiently complete to beimplemented. See also: software development process.

    Global Positioning System (GPS) is a Global Navigation Satellite System (GNSS)developed by the United States Department of Defense. It is the only fully functionalGNSS in the world. It uses a constellation of between 24 and 32 Medium Earth Orbitsatellites that transmit precise microwave signals, which enable GPS receivers todetermine their current location, the time, and their velocity.

  • 8/3/2019 CDCAAS-SPMP-1.0

    38/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    21

    Integration Testing Testingperformed to expose faults in the interfaces and in theinteraction between integrated components.

    Kernel The guts of any operating system (OS). The system loads the kernel into the

    main memory which stays there while other pieces of the OS go in and out of memory.The kernel control s all request for disks, processors, or other resources.

    Lifecycle - Lifecycle refers to the process used to build the deliverables produced bythe project. There are many models for a project lifecycle.

    Milestone A milestone is a scheduling event that signifies the completion of a majordeliverable or a set of related deliverables. A milestone, by definition, has duration ofzero and no effort. There is no work associated with a milestone. It is a flag in thework plan to signify that some other work has completed. Usually, a milestone is usedas a project checkpoint to validate how the project is progressing. In many casesthere is a decision, such as validating that the project is ready to proceed further,

    that needs to be made at a milestone.Outsource Refers to a company that contracts with another company to provideservices that might otherwise be performed by in-house employees.

    Peer Review A review of a software work product, following defined procedures, bypeers of the producers of the product for the purpose of identifying defects andimprovements.

    Preliminary Design Process of analyzing design alternatives and defining thearchitecture, components, interfaces, and timing and sizing estimates for a system orcomponent.

    Quality Assurance A planned and systematic pattern of all actions necessary toprovide adequate confidence that an item or product conforms to establishedtechnical requirements.

    Requirements A condition or capability that must be met or possessed by a systemor system component to satisfy a contract, standard, specification, or other formallyimposed documents.

    Scope Scope is the way you describe the boundaries of the project. It defines whatthe project will deliver and what it will not deliver. High-level scope is set in yourproject definition (charter) and includes all of your deliverables and the boundaries ofyour project. The detailed scope is identified through your business requirements.

    Security Technical Implementation Guides (STIG) A Department Of Defensesecurity guideline for configuration of COTS software and hardware.

    Software Life Cycle Process - Software Life Cycle Process is amethod and standardsfor improving and mastering development processes, supporting processes andmanagement processes throughout the software lifecycle.

    Spiral Model The spiral model is a software development process combiningelements of both design and prototyping-in-stages, in an effort to combine advantages

  • 8/3/2019 CDCAAS-SPMP-1.0

    39/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    22

    of top-down and bottom-up concepts. The spiral model is intended for large,expensive and complicated projects.

    Stakeholder Specific people or groups who have a stake in the outcome of the

    project are stakeholders. Normally stakeholders are from within the company andmay include internal clients, management, employees, administrators, etc. A projectcan also have external stakeholders, including suppliers, investors, community groups,and government organizations.

    System Testing Testing conducted on a complete, integrated system to evaluate thesystem's compliance with its specified requirements.

    Unit Testing a method of testing that verifies the individual units of source code areworking properly. A unit is the smallest testable part of an application.

    Virtual Private Network (VPN) computer network in which some of the linksbetween nodes are carried by open connections or virtual circuits in some largernetwork (e.g., the Internet) instead of by physical wires. The link-layer protocols ofthe virtual network are said to be tunneled through the larger network when this isthe case. One common application is secure communications through the publicInternet, but a VPN need not have explicit security features, such as authentication orcontent encryption. VPNs, for example, can be used to separate the traffic ofdifferent user communities over an underlying network with strong security features.

    Waterfall Model The waterfall model is a sequential development process, in whichdevelopment is seen as flowing steadily downwards (like a waterfall) through thephases of requirements analysis, design, implementation, testing (validation),integration, and maintenance.

    Work Breakdown Structure A work breakdown structure or WBS is a tree structure,which permits summing of subordinate costs for tasks, materials, etc., into theirsuccessively higher level parent tasks, materials, etc. It is a fundamental toolcommonly used in project management and systems engineering.

    Work Package Like a project plan in miniature, a work package is a subset of aproject that can be assigned to a specific party for execution.

    1.5.2 Acronyms

    Acronyms Term1M Percentage of integration redone during reuse

    3GL Third-Generation Programming LanguageAAF Adaptation Adjustment FactorAAM Adaptation Adjustment MultiplierACAP Analyst CapabilityACAP Analyst Capability (COCOMO)ACM Association for Computing MachineryACT Annual Change TrafficAEXP Applications Experience (COCOMO)

  • 8/3/2019 CDCAAS-SPMP-1.0

    40/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    23

    Acronyms TermASLOC Adapted Source Lines of CodeAT Automated Translation

    BPS Bits per SecondBRAK

    Breakage. The amount of controlled change allowed in a softwaredevelopment before requirements are unfrozen.

    C4I (Command/Control/Communications/Computer and Intelligence)CASE Computer Aided Systems EngineeringCDCAAS Crime Data Collection, Aggregation, and Assimilation SystemCDRL Contract Data Requirements ListsCD-RW Compact Disc RewritableCEO Chief Executive OfficerCIO Chief Information OfficerCM Percentage of code modified during reuse

    CM Configuration ManagementCMM Capability Maturity ModelCMMI Capability Maturity Model lntegrationCOCOMO COnstructive COst MOdelConops Concept of Operations DocumentCORBA Common Object Request Broker ArchitectureCOTS Commercial Off-the-ShelfCPI Cost Performance Index (COCOMO)CPLX Product ComplexityCSCI Computer Software Configuration HemCSTB Computer Science and Telecommunications Board

    DATA Data Base Size I COCOMODBMS Database Management SystemDI Degree of InfluenceDM Percentage of design modified during reuseDOCU Documentation to match lifecycle needsDRC Direct Resource CodeDSI Delivered Source InstructionsDVD Digital Versatile Video DiscDVD-R DVD non-Rewriteable format Read onlyDVD-RW DVD Rewriteable format Read and WriteEAF Effort Adjustment Factor (COCOMO)

    ECP Engineering Change ProposalsECR Exploration Commitment ReviewEDS Electronic Data SystemsEIA Electronic Industry AllianceEM Engineering ManagerESLOC Equivalent Source Lines of CodeEV Earned ValueFCIL Facilities

  • 8/3/2019 CDCAAS-SPMP-1.0

    41/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    24

    Acronyms TermFCR Foundation Commitment ReviewFLEX Development Flexibility (COCOMO)

    FOUL Follow-Ons Unlimited".FP Function PointsGB GigabyteGFS Government Furnished SoftwareGHz GigahertzGNU Gnu not UnixGOTS Government Off the ShelfGPS Global Positioning SystemGUl Graphical User InterfaceH/W HardwareHWCl Hardware Configuration Item

    ICASE Integrated Computer Aided Software EnvironmentIDE Integrated Development EnvironmentIEEE Institute of Electrical and Electronics Engineers, Inc.INCOSE International Council on Systems EngineeringISMS Information Security Management SystemISO Information Standards OrganizationIT Information TechnologyITIL Information Technology infrastructure LibraryKASLOC Thousands of Adapted Source Lines of CodeKEDSI Thousands of Estimated Delivered Source Instructions (COCOMO)KESLOC Thousands of Equivalent Source Lines of Code

    KSLOC Thousands of Source Lines of CodeLAN Local Area NetworkLEXP Programming Language Experience (COCOMO)LTEX Language and Tool Experience (COCOMO)MHz MegahertzMIS Management Information SystemMLS Multi-level secureMM Effort in Programmer-MonthsMODP Modem Programming PracticesMS Master of Science DegreeN1ST National Institute of Standards and Technology

    NDI Non-Development ItemNOP New Object PointsOCR Operations Commitment ReviewODBC Open Database ConnectivityOLE Object Linking and EmbeddingOPF Open Process FrameworkOS Operating SystemPCAP Programmer Capability (COCOMO)

  • 8/3/2019 CDCAAS-SPMP-1.0

    42/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    25

    Acronyms TermPCON Personnel Continuity (COCOMO)PDA Personnel Digital Assistant

    PDlF Platform DifficultyPERS Personnel CapabilityPERT Program Evaluation and Review TechniquePEXP Platform ExperiencePL Product Line

    PMPerson months, the unit of effort COCOMO II uses to expresseffort.

    PMAT Process Maturity (COCOMO)PMBOK Project Management Body of KnowledgePMI Program Management InstitutePMP Project Management Plan

    PREC Precedentedness (COCOMO)PREX Personnel ExperiencePROD Productivity rate

    PSMPractical Software and Systems Measurement (Lecture Topics, Oct20)

    PVOL Platform VolatilityQA Quality AssuranceRAM Random Access MemoryRCPX Product Reliability and ComplexityRELY Required Software ReliabilityRESL Architecture / Risk Resolution (COCOMO)

    RFID Radio Frequency IdentificationRFP Request for ProposalRUSE Required Reusability (COCOMO)RVOL Requirements VolatilitySADT Structured Analysis and Design TechniqueSCAMPI Standard CMMI Assessment Method for ProcessSCED Required Development Schedule (COCOMO)SDLC Software Development Life CycleSECU Classified Security ApplicationSEI Software Engineering Institute at Carnegie Mellon UniversitySITE Multi-site Development (COCOMO)

    SLA Service Level AgreementSLIM Software Lifecycle Management (Larry Putnam)SLOC Source Line of CodeSME Subject Matter ExpertSNAFU Situational Normal: All Fouled Up, or similarSOA Service Oriented ArchitectureSOO Statement of Operational ObjectivesSOW Statement of Work

  • 8/3/2019 CDCAAS-SPMP-1.0

    43/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    26

    Acronyms TermSPI Software Performance Index

    SPICESoftware Process Improvement and Capability Determination, the

    ISO 15504 software capability assessment standardSPMP Software Project Management PlanSQA Software Quality AssuranceSTOR Main Storage ConstraintSU Percentage of reuse effort due to software understandingSwSE Software System EngineeringT&E Test And EvaluationTEAM Team Cohesion (COCOMO)TIME Execution Time ConstraintTOOL Use of Software Tools (COCOMO)TR Technical Report

    TURN Computer Turnaround TimeUML Unified Modeling LanguageUNFM Programmer UnfamiliarityUSAFIESD U.S. Air Force Electronic Systems DivisionUSB Universal Serial BusUSC University of Southern CaliforniaV&V Verification and ValidationVCR Valuation Commitment ReviewVEXP Virtual Machine ExperienceVIRT Virtual Machine VolatilityVMVH Virtual Machine Volatility: Host

    VMVT Virtual Machine Volatility: TargetWAN Wide Area NetworkWBS Work Breakdown StructureWITS Worldwide Identity Tracking SystemWP Work PackageWWW World Wide Web

  • 8/3/2019 CDCAAS-SPMP-1.0

    44/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    27

    2. Project Organization

    2.1 Process Model

    Figure 15: CDCAAS Process Model

    2.1.1 Process Milestones

    This section identifies milestones for all activities for managing and performing the

    work specified in the products contractual requirements including tasks, reviews, anddeliverables. These milestones include base lining requirement, generating baselines,formal and informal peer review, customer review, and getting feedback fromcustomer.The following milestones are planned for the CDCAAS release:

    Project Kickoff Meeting

    Completion of Requirements Specification

  • 8/3/2019 CDCAAS-SPMP-1.0

    45/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    28

    Completion of Design Phase

    Completion of Sub-System Test Phase

    Completion of System Test Phase

    Conclusion of Alpha Deployment Gate includes Customer signoff

    Conclusion of Beta Deployment Gate includes Customer signoff

    Completion of Deployment Phase

    Activities Procedures Exit Condition

    Project KickoffMeeting

    Administrating and resourceallocation between projectmembers Draft of software Project

    Management Plan (SPMP)

    Staff assigned with officespace, computers andcommunications Management team agrees on

    draft of SPMP

    Systems RequirementsReview

    Define requirements forcustom, COTS, reuse/NDI,and outsourced packages

    Estimate resources

    Management signs off onestimate and resourcebaseline and approves finalSPMP

    Systems PreliminaryDesign Review

    Hold series of internalpreliminary design reviews

    Get user agreement onfunctional baseline

    Team leaders agree on designtemplates, documentationtemplates, commonfunctionality features to bedocumented for version 1.0

    RequirementSpecification

    Create and analyze usecases. Analyze and definerequirements for custom,COTS, reuse/NDI, andoutsourced packages Review requirements forfeasibility and testability. Establish and documentallocation baseline Produce final SPMP

    Start developing test plan

    Review closed andrequirement is base lined Customer agrees and signsoff baseline requirements. Management providesnecessary resources.

    Preliminary DesignReview

    Complete preliminarydesign for COTS, Custom andreuse packages. Conduct series ofpreliminary design reviews Get user agreement onfunctional baseline

    Baseline PDD (PreliminaryDesign Document) Close PDD review Baseline Functionalspecification User agreement formallysigned and archived

  • 8/3/2019 CDCAAS-SPMP-1.0

    46/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    29

    Activities Procedures Exit Condition

    Critical Design

    Design detailed system

    features including userinterface, data structure, andcommunication methodbetween modules. Conduct review on CriticalDesign artifact. Establish baselines forCritical Design Document. Ger user agreement onCritical Design baseline

    Critical design document iscreated. Close Detail Design review User agreement formallysigned and archived

    Coding and unit test

    Coding and document

    custom ,COTS and reusepackages Test COTS, custom, andreuse code, including maturereuse prototype

    Software is developed and

    source controlled Results of tests documentedand signed off by projectmanagement

    Sub system test

    Test outsourced packageand test all sub-systemfunctionality Validate components andsub-system functionality.

    Results of tests documentedand signed off by projectmanagement User agreement formallysigned and archived

    System test

    Test full functionality basedon user work flow for all 11packages Fix bugs found duringintegration testing andfinalize baselines.

    Results of tests documented

    and signed off by projectmanagement User manual andmaintenance manualdocumented Product baseline established User agreement formallysigned and archived

    Deployment andSupport

    Alpha and beta testcompleted Start help desk operation

    Deploy system at user sites Begin user training Begin softwaremaintenance activities

    Customers sign off ondeployment System deployed at user

    sites Scheduled for user training Help desk and maintenanceoperational

  • 8/3/2019 CDCAAS-SPMP-1.0

    47/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    30

    Activities Procedures Exit Condition

    Phase out

    Document best practices,

    lessons learned, and futuremarketing opportunities Discontinue automaticlicense upgrades Close out supportingcontracts

    Documentation submitted to

    management and to corporateknowledge database. Close-out licensing andcontract information sent toFinance Office ContractingOffice, and managementpersonnel and acknowledged

    Figure 9: Activities, Benchmarks and Success Indicators

    2.1.2 Baselines

    The essential idea of baselines is that in order to reach a destination it is necessary toknow your starting point. In CDCAAS project the following three baselines will be usedfor each component during its waterfall development lifecycle.

    Functional Baseline: Describes a systems or items functional characteristics, and theverifications required to demonstrate the achievement of those specified functionalcharacteristics.

    Allocated Baseline: Describes the functional and interface characteristics for CI(Configuration Item) that are allocated from those of the higher level CI and theverification required to demonstrate achievement of those specified characteristics.

    Product Baseline: Defines the releasable contents of the project including the

    application, test case, test results, system and user documentation during theproduction, fielding/deployment and operational support phases of its life cycle.

    2.1.3 Reviews

    Various internal reviews and customer reviews will be conducted as scheduled insection 5.5 and review comments and sign off will be documented for each review.Also additional review may be conducted if necessary or based on customer request toidentify possible problem in early stage. Those reviews will be Software RequirementSpecification Review, Preliminary Design Review, Critical Design Review, Various TestReadiness Review, and Deployment Readiness Review. Other activities also requiredcustomer review and sign off will be required before it is executed.

    2.1.3.1 Software Requirements Review

    A Requirements Review is one of a number of such reviews to verify and approve setsof system-level requirements as they are developed. The main purpose of this reviewis to ensure that the design is progressing in the correct to give the team a confidencein the design process through the progressive monitoring and approval of the system-

  • 8/3/2019 CDCAAS-SPMP-1.0

    48/223

    Crime Data Collection, Aggregation and Assimilation System (CDCAAS) Version 1.0

    Team Crime Busters 12/08/2008SWE 625 - Professor Ken Nidiffer

    31

    level requirements that are developed between the User Requirements Document andthe Functional Baseline.

    A Requirements Review will be conducted as a formal review and end of the review

    customer will sign off and approved the baseline Requirements. Re-review will beconducted if necessary.

    2.1.3.2 Preliminary Design Review

    Preliminary Design Reviews will be held at the conclusion of Preliminary Design in thesystems engineering process to evaluate the Preliminary Design effort and to reviewand approve the Allocated Baseline containing the Development Specifications. Asingle sy