Determine the non-functional requirements
Course:- Theory of Computation
Reference No.:- EM13840514

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Theory of Computation


1. System Wide (Non-Functional) Requirements

a) Analysis of NFRs

Analyse the Case Study documents and determine the non-functional requirements (NFRs) or system quality attributes necessary to meet the needs identified in the Case Study. Consider the case study against the checklist provided. Prioritise the identified relevant NFRs, and specifically identify the 3-5 most important. For each of these high priority NFRs identify both benefit it confers and the cost of supporting it.


Trigger Question











b) System Wide Requirement Document

Document and expand your analysis in a System Wide Requirement document. Use the System Wide Requirement Specification template provided in the Resources/Assignment 2 section of the subject Interact site. Make sure your SWRS document addresses:

i) System wide services (required system functionality not captured by a single use case) These are the ‘F' of FURPS+: e.g. auditing, printing, authentication).

ii) Non-functional requirements (system qualities). These are the URPS of FURPS+. Identify the specific NFRs you considered relevant from the checklist under the general URPS+ catego-ries.

iii) Any required system interfaces with external systems.

iv) Any business rules that must be applied.

v) Any constraints that will affect the design of the system. (Interfaces and constraints are the ‘+' of FURPS+)

2. Architecture Notebook

Analyse the Case Study documents and develop a candidate architecture to meet the functional and non-functional requirements you have identified in Assignment 1 and the system wide requirements identified in Task 1. Document this candidate architecture in an Architectural Notebook. Use the tem-plate provided in the Resources/Assignment 2 section of the subject Interact site. Make sure the architectural notebook addresses:

i) The key concerns driving the overall architecture. (These should correspond with the 3-5 most important NFRs you identified.)
ii) Any assumptions and dependencies that affect the architecture.
iii) Any architecturally significant requirements. (E.g. a requirement for persistent data may require access to a database)
iv) Decisions, constraints, and justifications that shape the architecture.
v) Architectural mechanisms used to implement requirements (e.g a database or XML file to im-plement a persistence requirement)
vi) Any architectural frameworks or patterns that will be applied

3. Component Diagram

Document your proposed architecture with a high level logical view showing functional and technical components in a component diagram.

4. Deployment Diagram

Document how your proposed architecture maps to the intended deployment environment with a de-ployment diagram showing how your functional and technical components will be distributed over hardware nodes.


Verified Expert

Preview Container content


The on spot coureir service manager should systematically deliver quick performance. One amongst the primary goal of the new system is to modify drivers to deliver quicker service to customers, and this goal is met provided that we have a tendency to style an online website that's quick and responsive.

The home page has to load on a typical high speed web association in for seconds or less, and alternative operation should be ready to be complete in the same quantity of your time.


Because On the Spot is change from a low-tech system supported paper records, the new system should deliver an equivalent dependability of the older ways. an unpredictable amount of period might cause a significant disruption to the company’s business processes. Implementing redundant servers can facilitate alleviate the chance of a server going down.

On the Spot courier service can contract with an ISP that guarantees ninety nine. The 99% time period throughout business hours. All maintenance touching the delivery system should be performed once business hours. Maintenance that forestalls clients from work in should be performed late in the dark to attenuate attainable disruptions to customer payments and different mission-critical services.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Theory of Computation) Materials
Discuss the parallel performance of the LU factorization routine and the triangular solver routines. Comment on the observed performance and the possible reasons for the obs
Construct a diagram to map the arguments about a moral claim that you have identified and write an essay, which maps closely to the diagram that you constructed in Step 1.
Goal is to find expedition of maximum profit. Either show that there exists polynomial-time algorithm for GDP, or show that corresponding decision problem is NP-complete.
Convert to hexadecimal: 1457.1110.Round to two digits past the hexadecimal point. Convert to hexadecimal: 1457.1110. Round to two digits past the hexadecimal point.
Think about the following Turing-machine model, A tape that is infinitely long in both directions and is divided into cells; at any given step, each cell either is blank or co
Give a memory snapshot each statement is executed. Assuming that x is equal to 4 and that y is equal to 6 before the statement is executed. Also, assume that all the variabl
Compute the following Azimuths into Bearings a. 132°45'31" b. 289°12'12" c. 220°47'39" Compute the following Bearings into Azimuths a. N00°00'59"E b. S89°14'56"E c. S45°00'00
Construct a truth table for each of the following arguments. Determine whether each argument is valid or invalid. Justify your answer with a complete or partial truth table.