3.4.1 Review of data flow scenarios