Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 6, Problem 6.3E
Program Plan Intro
Conflicts of availability and security requirements:
- In general, the most commonly known non-functional requirements for designing the system architecture are as follows:
- Security
- Safety
- Maintainability
- Performance
- Availability
- While designing an architecture, the conflicts that are encountered in security and availability requirement cases are the above mentioned non-functional requirements.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Explain why design conflicts might arise when designing an architecture for which both performance and security requirements are the most important non-functional requirements.
Explain why design conflicts may arise when developing an architecture with availability and security as the most crucial non-functional criterion.
Proposed and justify one or more suitable architecture style(s) for the given scenario to improve interaction and sharing of system components.
You intend to develop an online voting system for general elections. The major use cases of the voting model system include authorizing User that includes simple users and the system's staff. The system manages election districts and election units. The election unit is the system counterpart of the “election center”. In the conceptual model, the election center is central to the election procedure, as it is the fundamental tallying point. The votes are casted using machines provided by the state and are places at the election center. The fundamental assumption of this system is that almost all citizens above a certain age should be able to participate in the election procedure. It is practically infeasible for election staff to manually enter all electors into the system. The system should thus be able to import an electronic list of…
Chapter 6 Solutions
Software Engineering (10th Edition)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Layered software architectural pattern is a widely used pattern. You are required to discuss the applicability of this pattern in the following situations: 1) when the system being developed is a web application. 2) when High performance of the application is more important than security. 3) when security is more important than performance. 4) when Ease of deployment is not importantarrow_forwardBenefits of Architecture Description Language (ADL) can be. O Þesigns that can be well understood by developers O Designs that cannot be analyzed for consistency O Designs based more on defaults O Architectural constraints are not enforced as a system evolvesarrow_forwardExplain why design conflicts may develop when creating an architecture for which the most critical non-functional criteria are both availability and security.arrow_forward
- Design the software architecture for a professional conference online registration system using the MVC architecture. The functional requirements include: announcement, call for papers, online paper submission, online paper reviews, paper notification, conference online registration, etc. Draw the corresponding block diagram, class diagram, and either a sequence or collaboration diagram. When designing a solution based on this architecture, be sure to consider how to increase performance, extensibility, and scalabilityarrow_forwardYou are to investigate and catalog common anti-patterns, then classify them according to their occurrence in the Design, Development, or Architecture phases. For each stage of the process, you should provide at least three instances of potential anti-patterns.arrow_forwardSystems engineering theory suggests that some control is required when transitioning between life cycle stages. These transitions represent important interfaces within a system. Often different organisations are involved for each phase: the design organisation may be different to the construction organisation; and different again to the owner, operator and maintenance organisations. (a)For the interfaces mentioned: a) From design to construction, and, b) from construction 0 to owner, operator-and-maintainer, list 2 significant challenges or issues this generates and explain why. (b)For each of these challenges or issues, identify how these can be managed: what actions: i) processes; or organisational arrangements should be put into place, for example?arrow_forward
- What is the main advantage of the microkernel approach to system design? How do user programs and system services interact in a microkernel architecture model? What are the disadvantages of using the microkernel approach?arrow_forwardQuestion # 03: What are the major advantages of the microkernel approach to system design?How do system services and user programs interact in microkernel architecture? Explain withdiagramarrow_forwardUsing: https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf At p. 15, Security, there are some design principles. Explain how these design principles can be integrated with one of the architectural patterns of a system.arrow_forward
- Explain why you normally use several architectural patterns when designing the architecture of a large system. Apart from the information about patterns that we have discussed in class, what additional information might be useful when designing large systems? also discuss any two patterns along with examples?arrow_forwardWhat perspectives have to be taken into consideration when designing models for software-intensive system architectures?arrow_forwardJustify the need for a vision or model of the architecture?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems Analysis and Design (Shelly Cashman Serie...Computer ScienceISBN:9781305494602Author:Scott Tilley, Harry J. RosenblattPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Systems Analysis and Design (Shelly Cashman Serie...
Computer Science
ISBN:9781305494602
Author:Scott Tilley, Harry J. Rosenblatt
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning