Académique Documents
Professionnel Documents
Culture Documents
• Once context is modeled and all external software interfaces have bee
n described, you can identify a set of architectural archetypes.
Architectural Design
Subordinate systems:
Those systems that are used by the target system and provide data o
r processing that are necessary to complete target system functionality.
Peer-level systems:
Those systems that interact on a peer-to- peer basis (i.e., informatio
n is either produced or consumed by the peers and the target system.
Actors:
Entities (people, devices) that interact with the target system by pro
ducing or consuming information.
Node :
Represents a cohesive collection of input and output elements of the home
security function.
For example a node might be included of (1) various sensors and (2) a vari
ety of alarm (output) indicators.
Detector :
An abstraction that covers all sensing equipment that feeds information i
nto the target system.
Indicator:
An abstraction that represents all mechanisms (e.g., alarm siren, flashing
lights, bell) for indicating that an alarm condition is occurring.
Controller:
An abstraction that describes the mechanism that allows the arming (Su
pporting) or disarming of a node. If controllers reside on a network, they have the
ability to communicate with one another.
Refining the Architecture into Components
• The architectural design that has been modeled to this point is still rela
tively high level.
• The overall structure of the system is apparent, and the major softwar
e components have been identified.
1.Collect scenarios : A set of use cases is developed to represent the system from
the user’s point of view.
3. The architectural style(s) should be described using one of the following arch
itectural views ,
•Module view for analysis of work assignments with components and the d
egree to which information hiding has been achieved.
•Process view for analysis of system performance.
•Data flow view for analysis of the degree to which the architecture meets f
unctional requirements.
• An ADL should provide the designer with the ability to decompose arc
hitectural components,
• Data flows into the system along an incoming flow path where it is tran
sformed from an external world representation into internalized form. Once it has
been internalized, it is processed at a transform center.
• Finally, it flows out of the system along an outgoing flow path that tra
nsforms the data into external world form.
Transform Mapping
• Transform mapping is a set of design steps that allows a DFD with tran
sform flow characteristics to be mapped into a specific architectural style.
• To illustrate this approach, we again consider the SafeHome security f
unction.
• To map these data flow diagrams into a software architecture, you wo
uld initiate the following design steps:
1. Review the fundamental system model.
2. Review and refine data flow diagrams for the software.
3. Determine whether the DFD has transform or transaction flow characte
ristics.
4. Isolate the transform center by specifying incoming and outgoing flow b
oundaries.
5. Perform “first-level factoring.”
6. Perform “second-level factoring.”
7. Refine the first-iteration architecture using design heuristic for
improved software quality.