Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 6, Problem 6.3E
Program Plan Intro
Conflicts of availability and security requirements:
- In general, the most commonly known non-functional requirements for designing the system architecture are as follows:
- Security
- Safety
- Maintainability
- Performance
- Availability
- While designing an architecture, the conflicts that are encountered in security and availability requirement cases are the above mentioned non-functional requirements.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Explain why design conflicts might arise when designing an architecture for which both performance and security requirements are the most important non-functional requirements.
Explain why design conflicts may develop when creating an architecture for which the most critical non-functional criteria are both availability and security.
Explain why design conflicts may arise when developing an architecture with availability and security as the most crucial non-functional criterion.
Chapter 6 Solutions
Software Engineering (10th Edition)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Explain why architectural design conflicts may arise when designing an architecture that both requirements for usability and security are the most important non -functional requirements.arrow_forwardI need the answer as soon as possiblearrow_forwardProposed and justify one or more suitable architecture style(s) for the given scenario to improve interaction and sharing of system components. You intend to develop an online voting system for general elections. The major use cases of the voting model system include authorizing User that includes simple users and the system's staff. The system manages election districts and election units. The election unit is the system counterpart of the “election center”. In the conceptual model, the election center is central to the election procedure, as it is the fundamental tallying point. The votes are casted using machines provided by the state and are places at the election center. The fundamental assumption of this system is that almost all citizens above a certain age should be able to participate in the election procedure. It is practically infeasible for election staff to manually enter all electors into the system. The system should thus be able to import an electronic list of…arrow_forward
- Design the software architecture for a professional conference online registration system using the MVC architecture. The functional requirements include: announcement, call for papers, online paper submission, online paper reviews, paper notification, conference online registration, etc. Draw the corresponding block diagram, class diagram, and either a sequence or collaboration diagram. When designing a solution based on this architecture, be sure to consider how to increase performance, extensibility, and scalabilityarrow_forwardJustify the need for a vision or model of the architecture?arrow_forwardWhat is the main advantage of the microkernel approach to system design? How do user programs and system services interact in a microkernel architecture model? What are the disadvantages of using the microkernel approach?arrow_forward
- Question # 03: What are the major advantages of the microkernel approach to system design?How do system services and user programs interact in microkernel architecture? Explain withdiagramarrow_forwardI need the answer as soon as possiblearrow_forwardWhy is it common practice to use many architectural patterns while creating the framework for a sizable system?arrow_forward
- Explain why you often utilize a number of architectural patterns when creating the architecture of a large system.arrow_forwardExplain the concept of real-time constraints in embedded systems. How can developers ensure that critical tasks meet their real-time requirements?arrow_forwardIn the context of software architecture, compare and contrast microservices and monolithic architectures, discussing when each is suitable for a project.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems Analysis and Design (Shelly Cashman Serie...Computer ScienceISBN:9781305494602Author:Scott Tilley, Harry J. RosenblattPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Systems Analysis and Design (Shelly Cashman Serie...
Computer Science
ISBN:9781305494602
Author:Scott Tilley, Harry J. Rosenblatt
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning