Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 6, Problem 6.3E
Program Plan Intro
Conflicts of availability and security requirements:
- In general, the most commonly known non-functional requirements for designing the system architecture are as follows:
- Security
- Safety
- Maintainability
- Performance
- Availability
- While designing an architecture, the conflicts that are encountered in security and availability requirement cases are the above mentioned non-functional requirements.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Explain why design conflicts might arise when designing an architecture for which both performance and security requirements are the most important non-functional requirements.
Explain why design conflicts may develop when creating an architecture for which the most critical non-functional criteria are both availability and security.
Explain why design conflicts may arise when developing an architecture with availability and security as the most crucial non-functional criterion.
Chapter 6 Solutions
Software Engineering (10th Edition)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Explain why architectural design conflicts may arise when designing an architecture that both requirements for usability and security are the most important non -functional requirements.arrow_forwardBenefits of Architecture Description Language (ADL) can be. O Þesigns that can be well understood by developers O Designs that cannot be analyzed for consistency O Designs based more on defaults O Architectural constraints are not enforced as a system evolvesarrow_forwardLayered software architectural pattern is a widely used pattern. You are required to discuss the applicability of this pattern in the following situations: 1) when the environment is Continuously changing 2) when High performance of the application is important 3) when Ease of testing is important 4) when Ease of deployment is importantarrow_forward
- Layered software architectural pattern is a widely used pattern. You are required to discuss the applicability of this pattern in the following situations: 1) when the system being developed is a web application. 2) when High performance of the application is more important than security. 3) when security is more important than performance. 4) when Ease of deployment is not importantarrow_forwardI need the answer as soon as possiblearrow_forwardYour job is to examine the different software systems used by your organization, or the ones you have used, and create an architecture context diagram within the perspectives of a logical view, a process view, a development view, and a physical view. Then, explain the following: - Explain the technical role it plays in the organization. Explain the contextual (business, global, economic, environmental, and societal) influences affecting the key elements/responsibilities of the system. Is there an ethical impact that you will need to address? Justify your rationale.arrow_forward
- What exactly is the importance of architecture? Take into consideration the architecture-free mapping and the architecture-based mapping of a project.arrow_forwardReview the Event-Driven Architecture in the article “Software Architecture Patterns”. Provide a discussion of the following: What are some key differentiating features of the pattern? What are some key differentiating qualities of the pattern? What are some applications well-suited to the pattern? Provide an example. What are some applications not well-suited to the pattern? Provide an example.arrow_forwardWhat are the benefits of using a layered architectural approach?arrow_forward
- You are to investigate and catalog common anti-patterns, then classify them according to their occurrence in the Design, Development, or Architecture phases. For each stage of the process, you should provide at least three instances of potential anti-patterns.arrow_forwardJustify the need for a vision or model of the architecture?arrow_forwardWhat is the main advantage of the microkernel approach to system design? How do user programs and system services interact in a microkernel architecture model? What are the disadvantages of using the microkernel approach?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems Analysis and Design (Shelly Cashman Serie...Computer ScienceISBN:9781305494602Author:Scott Tilley, Harry J. RosenblattPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Systems Analysis and Design (Shelly Cashman Serie...
Computer Science
ISBN:9781305494602
Author:Scott Tilley, Harry J. Rosenblatt
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning