203

ISBN : 978-81-963532-2-3 (E-Book) modulethrough a reserve operation. Then, he carries out all necessary changes on this private copy.However, restoring the changed module to the system configuration requires the permission of achange control board (CCB). The CCB is usually constituted from among the development teammembers. For every change that needs to be carried out, the CCB reviews the changes made tothecontrolled object andcertifiesseveral things about thechange: 1. Changeiswell-motivated. 2. Developerhasconsideredanddocumentedthe effectsofthechange. 3. Changesinteract wellwiththechangesmadebyotherdevelopers. 4. Appropriatepeople(CCB)havevalidatedthechange,e.g.someonehastestedthechangedcode,an d has verifiedthat thechangeis consistent with therequirement. The change control board (CCB) sounds like a group of people. However, except for verylarge projects, the functions of the change control board are normally discharged by theproject manager himself or some senior member of the development team. Once the CCBreviews the changes to the module, the project manager updates the old base line through arestore operation (as shown in fig. 38.1). A configuration control tool does not allow adevelopertoreplaceanobjecthehasreservedwithhislocalcopyunlesshegetsanauthorization from the CCB. By constraining the developers’ ability to replace reservedobjects, a stable environment is achieved. Since a configuration management tool allows onlyone engineer to work on one module at any one time, problem of accidental overwriting iseliminated. Also, since only the manager can update the baseline after the CCB approval,unintentionalchanges are eliminated. ConfigurationManagementTools SCCSandRCSaretwopopularconfigurationmanagementtoolsavailableonmostUNIXsystems. SCCS or RCS can be used for controlling and managing different versions of text files.SCCS and RCS do not handle binary files (i.e. executable files, documents, files containingdiagrams, etc.) SCCS and RCS provide an efficient way of storing versions that minimizes theamount of occupied disk space. Suppose, a module MOD is present in three versions MOD1.1,MOD1.2, 198 Software Engineering Keerthana P, Manasa KN, Ganga D Bengal

204 Publizr Home


You need flash player to view this online publication