Question: 1 . Consider the ATM user stories as the set of scenarios to analyze. 2 . Assume the Use Cases provide a complete specification of

1. Consider the ATM user stories as the set of scenarios to analyze.
2. Assume the Use Cases provide a complete specification of the system requirements, constraints, and environmental description. If something is needed that is missing- define it now before proceeding.
3. Select 3 candidate architectures for the ATM system and answer the questions below for each as a way and discuss how the selected architecture address the scenarios and requirements (module view, process view, data flow view)
Control questions
How is control managed within the architecture?
Does a distinct control hierarchy exist?
How do components transfer control within the system?
How is control shared among components?
What is the control topology?
Is control synchronized or asynchronous?
Data questions
How are data communicated among components?
Is the flow of data continuous or sporadic?
What is the mode of data transfer?
Do data components exist? If so what is their role?
How do functional components interact with data components?
Are data components active or passive?
How do data and control interact within the system?
4. Assess the quality attributes for each candidate architecture independently
Reliability
Performance
Security
Maintainability
Flexibility
Testability
Portability
Reusability
Interoperability
5. Identify sensitivity points for architecture by trying to make small changes to each architecture candidate and see what the impact of the change is on each (e.g. consider the effect of adding a second bank branch were to the system).
6. Critique candidate architectures (from step 3) using the sensitivity analysis (conducted in step 5)
Key question why did you select one of the architecture candidates as the winner?
Why did you reject each of the other two?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!