Ran Wei / MBSE Series / Module 6
中文
MBSE Series — Ran Wei

Module 6: OOSEM

Object-Oriented Systems Engineering Method — from stakeholder needs analysis through logical and physical architecture, with a running home security system example.

Prerequisite: MBSE Module 5 — Pillar 3: The Modelling Tool
1

OOSEM Origins and Philosophy

OOSEM — the Object-Oriented Systems Engineering Method — was developed by Sanford Friedenthal, Alan Moore, and Rick Steiner, the same team behind the widely-used reference text A Practical Guide to SysML. The method emerged from the recognition that while object-oriented thinking had transformed software engineering, systems engineering lacked a comparable, structured approach that fully exploited the power of modelling languages like SysML.

Core philosophical principles

OOSEM brings several fundamental ideas from object-oriented thinking into the systems engineering domain:

NOTE

The canonical reference for OOSEM is: Friedenthal, S., Moore, A., & Steiner, R., A Practical Guide to SysML: The Systems Modeling Language (3rd edition, Morgan Kaufmann). The book presents OOSEM alongside SysML, but the method itself is language-independent — it can be applied with any systems modelling language.

Why "object-oriented" matters for SE

Traditional systems engineering often followed a purely functional decomposition — breaking the system into functions, then allocating functions to components. OOSEM adds the object-oriented dimension: the system is also decomposed into objects (logical entities) that own both structure and behaviour. This dual perspective — functional and structural — produces architectures that are more modular, more traceable, and easier to evolve when requirements change.

2

The OOSEM Process Overview

OOSEM organises the systems engineering effort into five main activities. Although they are presented in sequence, the process is fundamentally iterative — you will revisit earlier activities as understanding deepens.

  1. Analyse Stakeholder Needs — Identify who cares about the system and what they need. Capture needs in a structured form.
  2. Define System Requirements — Transform stakeholder needs into precise, verifiable system requirements that constrain the design.
  3. Define Logical Architecture — Decompose the system into logical subsystems based on functionality. This is the "what it does" view, independent of technology choices.
  4. Synthesise Candidate Physical Architectures — Map logical functions onto physical components. Generate multiple candidate solutions.
  5. Optimise and Evaluate — Conduct trade studies to select the best candidate architecture against requirements and constraints.
TIP

OOSEM is iterative, not strictly sequential. In practice, defining the logical architecture often reveals missing or ambiguous requirements, sending you back to step 2. Similarly, trade studies in step 5 may reveal that no candidate architecture meets all requirements, prompting a revision of the logical decomposition. Treat the five activities as a cycle, not a waterfall.

The running example: Home Security System

Throughout the remaining sections, we will apply OOSEM to a Home Security System. This system must detect intrusions, alert the homeowner, and optionally notify law enforcement. It is simple enough to fit in a tutorial but rich enough to illustrate every OOSEM activity.

3

Stakeholder Needs and Requirements Analysis

The first OOSEM activity is to understand who cares about the system and what they need. This is not just a formality — stakeholder needs are the ultimate source of truth against which every design decision will be validated.

Identifying stakeholders

For our home security system, the key stakeholders are:

Capturing needs and deriving requirements

Each stakeholder has needs expressed in their own language. The systems engineer must translate these into formal, verifiable requirements. The table below shows this mapping for our example:

StakeholderNeedDerived Requirement
HomeownerDetect intrusionThe system shall detect unauthorised entry through any door or window within 2 seconds.
HomeownerAlert ownerThe system shall send a push notification to the owner's mobile device within 5 seconds of detection.
Security companyNotify policeThe system shall transmit an alarm signal to the monitoring centre within 10 seconds of detection.
Security companyReliable communicationThe system shall support at least two independent communication channels (e.g., cellular and Wi-Fi).
InstallerEasy installationThe system shall be installable by one technician within 4 hours for a standard 3-bedroom house.
InstallerRemote diagnosticsThe system shall expose a diagnostic interface accessible via a mobile app for fault identification.
Table 1 — Stakeholder needs mapped to derived requirements (Home Security System)
ANALOGY

Think of stakeholder needs analysis like a doctor's consultation. The patient (stakeholder) says "my chest hurts" (need). The doctor translates this into a precise diagnosis and measurable test criteria — "blood pressure below 140/90, ECG within normal range" (derived requirements). Without this translation, you cannot verify whether the treatment (design) actually works.

4

Logical Architecture

Once requirements are established, OOSEM asks you to design the logical architecture — a decomposition of the system into subsystems based purely on what the system does, not on how it is physically built. This is the heart of OOSEM's "separation of concerns" philosophy.

Logical subsystems for the Home Security System

Analysing the requirements from Section 3, we can identify three primary logical functions:

Notice that at this stage we say nothing about cameras, motion sensors, sirens, or cloud servers. We only describe capabilities. The detection function detects; the alert function alerts; the control function coordinates. This is deliberate.

Why separate logical from physical?

The logical architecture acts as a stable backbone. Physical technologies change — today's motion sensor may be replaced by a radar module next year — but the logical function "detect intrusion" remains the same. By anchoring requirements to logical functions first, you ensure that:

TIP

Logical vs. Physical — the litmus test: If you find yourself naming specific technologies (e.g., "PIR sensor", "AWS Lambda", "Zigbee radio"), you have crossed into physical architecture territory. Logical architecture uses technology-neutral language: "detection", "communication", "processing". Keep the two layers separate until it is time to synthesise physical candidates.

5

Physical Architecture and Trade Studies

With the logical architecture defined, the next OOSEM activity is to synthesise candidate physical architectures. This means mapping each logical function to concrete, implementable components — and then evaluating which combination best satisfies the requirements.

Mapping logical to physical

For our Home Security System, the "detection" logical function could be realised by several physical technologies: passive infrared (PIR) motion sensors, door/window magnetic contact sensors, security cameras with video analytics, or a combination. Similarly, the "alert" function could use a local siren, a cloud-based push notification service, a direct cellular link to the monitoring centre, or all three.

OOSEM encourages generating multiple candidate architectures and then conducting a trade study to select the best one. Below is a simplified trade study comparing two candidates:

CriterionWeightCandidate A: Sensor-OnlyCandidate B: Sensor + Camera
Detection accuracy30%Good — PIR + magnetic contacts cover entry pointsExcellent — cameras add visual verification, reducing false alarms
Installation cost25%Low — sensors are inexpensive and wirelessMedium — cameras require power and positioning
Ongoing cost15%Low — minimal bandwidth, battery-powered sensorsHigher — video storage and bandwidth costs
Privacy impact15%Minimal — no video recordingModerate — indoor cameras raise privacy concerns
Scalability15%Good — easy to add more sensorsGood — cameras and sensors can be added independently
Weighted Score72 / 10081 / 100
Table 2 — Trade study comparing two candidate physical architectures

In this example, Candidate B scores higher overall because the improved detection accuracy (reducing false alarms and enabling visual verification) outweighs the additional cost and privacy considerations. The trade study makes the rationale explicit and traceable.

NOTE

A real trade study would include quantitative scores, sensitivity analysis, and stakeholder review. The simplified version above illustrates the structure of the activity. In OOSEM, the trade study is not an afterthought — it is a formal, documented decision gate that links the physical architecture back to requirements and stakeholder needs.

6

OOSEM Summary and When to Use

OOSEM provides a comprehensive, well-documented method for applying object-oriented thinking to the full systems engineering lifecycle. Let us summarise its strengths, weaknesses, and ideal use cases.

Strengths

Weaknesses

When to use OOSEM

OOSEM is best suited for:

Up Next

Module 7 — MagicGrid — A structured matrix approach to organising MBSE models by abstraction level and concern.