Professional Documents
Culture Documents
Note: The NEC has established these White Papers in an effort to distribute
hints about a subject domain quickly to the counting community.
This document is based on the function point counting practices as described in the
current 4.2 of the IFPUG Counting Practices Manual (CPM) and demonstrates the
applicability of IFPUG Function Points in the subject domain.
The contents of this paper are to be used exclusively as hints in the application of
function point counting in the domain described.
These hints do not constitute rule changes and should not be used as rules. While
this document has been reviewed and approved by the CPC, it does not constitute
IFPUG counting practice standards as contained in the CPM.
Introduction
Using current counting practices, as described in CPM 4.2, this paper presents a cohesive
set of hints on how to apply Function Point Analysis (FPA) to establish the function point
size of an application in a Client/Server environment.
Data
Management
Application
Presentation
Client/Server models.
The following picture (based on Gartner) is presented to give examples of various
combinations of the Client/Server components and how these can be combined with the
physical representation (e.g., Server computer, Client workstation):
Data
Presentation
Management
Client/Server models
Distributed functionality
The application component is split between Server and Client, usually for technical
reasons. All parts of the application component must function as a whole to meet the
defined business rules.
Presentation components reside on the Client and data management components reside on
the Server.
Application boundary
When determining the application boundary it is important to view the application from
the standpoint of the business requirement rather than the technical solution. The
technical solution has no effect on the application boundary. The user views the
application in a Client/Server environment as a whole and does not need to have
knowledge of the individual components that fulfill his business requirements (“the
individual components function cooperatively to jointly meet the business requirements
expressed by the user”). Only the data entering and crossing the boundary of the
application is important as shown by the diagram below.
Protocols and messaging between multiple layers in a multi-tiered technical solution do
not affect the user view of the business processes addressed by the application. It is not
necessary for all components of an application to reside on the same hardware platform
(i.e. Client or Server).
Data
Management
Data crossing
the boundary
Application
Presentation
The FTR’s can be found in the data management component as well as in other
components, as addressed in “counting data functions”.
Messages that pass between the Client and the Server or the individual components are
not counted as separate functions because data isn’t crossing the application boundary.
These messages are considered as part of the technical solution.
Summary
Seen from a business point of view, the application boundary in a Client/Server
environment consists of all components that collectively meet the business requirement,
regardless of physical implementation.
In identifying data or transactional functions, all components must be considered when
looking for (unique) functions.