Sei sulla pagina 1di 10

CIS 621

Design activities concerned with system architecture and databases provide a foundation for detailed design and construction. Thus, they are typically concentrated in early iterations during the elaboration phase. Detailed design activities are typically spread more evenly throughout the project. Briefly explain why this is the case. The design classes are the blueprints for the executable software application unit. Those units can stay in different locations and interact in various ways. The design activities are divided into six high level activities: 1. Design the support service architecture and deployment environment 2. Design the software architecture 3. Design case realizations 4. Design the database 5. Design the system and user interface 6. Design the system security and controls In the Unified Process, it is very difficult to determine the iteration to design the parts of a system. An analyst has to have a load of experience and foresight to be able to see the likely consequences of design decisions early on. The design activities can take place in any time or phase during the project duration. So, those design which might affect many parts of the system needs to be make early on somewhere during inception phase even though the activities that are used with the detailed design and architecture are distributed differently throughout the project.

CIS 621

Designing the software architecture, use case realization, database, interfaces and security controls are performed during the elaboration phase. Refer to the diagram below.

In the above figure, the design phase is shown much higher in the elaboration phase. The design phase covers the project phase almost entirely, and is parallel to project phase. Besides, parallel to it, other tasks can also be performed.

CIS 621

Discuss the following statement using your own words: The key to decomposing software into clients and servers is identifying resources or services that can be centrally managed by independent software units. Client server is a computing architecture which is implemented over a computer network and separates a client from a server. Each client or server is connected to a network, also known as join. The most basic type of client-server architecture employ two types of nodes: clients and servers. This type of architecture is sometimes referred to as two-tier. It allows devices to share files and resources. But if there is a third node in between the client and server which works as medium for their communications then that type of client server architecture is called the three-tier architecture. It is always better to have a central point between client and server. That central point can work as a medium between the client and software so that the actual server and its database are always hidden from the client. We can take a security authentication and authorization service. In each case a service provides a set of well defined processes such as retrieval, update, and approval based on a database store that is hidden from the client.

CIS 621

The above figure is showing the medium which is credit verification service between the client that is client processes or object, a server that is credit data store. In this example server software is kept in a separate server computer so that the clients will not directly interact with the server computer.

CIS 621

Explain why it is so difficult to track open items and unresolved issues in development projects. The development team generates the big amount of detailed information about the system. Classes, data fields, forms, reports, methods and tables are all being defined in substantial detail. A tremendous coordination is needed to keep track of all these pieces of information. Communication is very important between project members in an organization. To make that more effective a case system is created which connects the different project teams in a central repository of information. The figure is given below:

In the above diagram, we can see how the project team is centralized in a case data repository for establishing the centralized communication. Despite of all these efforts in some cases the information is not shared among the team members of a project. In a

CIS 621

project management the task is distributed among different project teams. Those teams are separated according to their work and qualification. It is not always necessary that the task performed by one project team is know by another project team. While performing the respective task some of the team can finish it as per time where as some of the team may not be able to finish the entire task in the right time and may have left it incomplete. But because of the lack of communication the other team members may not know about this. This could be a very big problem that cannot be resolved easily. At the time of synchronization this could even hamper the entire project work. It is really difficult to track the open items and unsolved problems in the development project.

CIS 621

Analysts must address important technical issues such as reliability, security, throughput, and synchronization. Explain the importance of each technical issue While discussing client/server architecture, it will be always incomplete unless we discuss about the WEB. WEB is a complex example of client/server architecture. The Internet revolves around the client-server architecture. Our computer runs software called the client and it interacts with software known as the server located at a remote computer. The client is usually a browser such as Internet Explorer, Netscape Navigator or Mozilla. Browsers interact with the server using a set of instructions called protocols. These protocols help in the accurate transfer of data through requests from a browser and responses from the server. There are many protocols available on the Internet. The World Wide Web, which is a part of the Internet, brings all these protocols under one roof. You can, thus, use HTTP, FTP, Telnet, email etc. from one platformyour web browser. The web employs a connection-less protocol, which means that after every client-server interaction the connection between the two is lost. Following are the most important points that have to be taken into consideration. Security: When you are connected to the Internet, an IP address is used to identify your PC. If you dont protect yourself, this IP address can be used to access your computer from the outside world. To keep the user secure from the hackers is one of the primary tasks for a network administrator or a web developer. The Internet is not a single network, but a vast array of loosely connected networks situated all over the world, easily accessible by individual

CIS 621

computer hosts in a variety of ways. Today, the Internet uses gateways, routers, dial-up connections, and Internet service providers (ISPs) to make itself readily available at all times. Individuals and organizations worldwide can reach any point on the network without regard to national or geographic boundaries or time of day. Risks such as the lost of valuable information, stealing, corrupting, or misusing is very common to occur in the Internet. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a file cabinet. Intruders do not need to enter an office of home, and may not even be in the same country. They can steal or tamper with information without touching a piece of paper or a photocopier. They can create new electronic files, run their own programs, and even hide all evidence of their unauthorized activity because of these reasons the security plays the very important role in the web. Reliability: Reliability is the mechanism of making the information consistent in a network or web. The primary department of reliability is the number of internal defects or faults and how often they are triggered by specific usages of manifest into problems experienced by users. Reliability is important in web service applications, as they often expose an enterprises critical processes, such as finance, insurance, customer relationship management or sales. Reliability can be ensured by providing compensations for faults, but he complexity of the applications makes it impossible to anticipate all the scenarios that the applications might encounter.

CIS 621

Throughput: Performance is the quality aspect of web service, which is measured in terms of throughput and latency. Higher throughput and lower latency values represent. The data transfer capability of many home computers are no more than 56 kbps which is the maximum for a RJ11 cable modem because of which even the bottle neck may occur between a Internet service provider and the backbone WANS. To minimize these kinds of problems some of the web sites prefer using just DIM instead of tables. This technique can solve the problem in one sense but its still not the perfect way. Web Synchronization: Synchronization means replicating the application files and configuring the information between servers. In case of clusters, synchronization makes sure that logical servers in a cluster share the same application files and configuration. Synchronization is also a useful alternative to importing and exporting packages. The following is the mechanism for dependability organizing. A session is created for each of one of the consumer browsers when an individual consumer downloads an initial web page from an HTTP server. A unique ID Is assigned to that session. After the session has been created for an individual browser, the information about the all activities from the consumer browser will be recorded into the session. Such a mechanism overcomes the difficulty to organize and manage the activities from the multiple consumer browsers that are in stateless nature.

CIS 621

Sources: olina, A, anchez, J, Kusiak, A. . Handbook of life cycle engineering: concepts,

models, and technologies. Dordrecht: Kluwer Academic Publishers Satzinger, J, Burd, S, & Jackson, S. (2005). Object-oriented analysis and design with the unified process . Boston, Mass.: Thomson, Course Technology Tinnirello, P. (2000). Systems development handbook . Boca Raton, Fla.: Auerbach.

Potrebbero piacerti anche