Develop a candidate architecture to meet the functional

Assignment Help Basic Computer Science
Reference no: EM13723295

Analyse the Case Study documents and develop a candidate architecture to meet the functional and non-functional requirements you have identified in Assignment 1 and Part A of Assignment 2. Document this candidate architecture with:
i. An Architectural Notebook. Make sure this notebook addresses:
a) The key concerns driving the overall architecture. b) Assumptions and dependencies c) Architecturally significant requirements d) Decisions, constraints, and justifications that shape the architecture e) Architectural mechanisms to be applied f) Key abstractions g) Any architectural frameworks or patterns that will be applied
Use the Architectural Notebook template
ii. A high level Logical View of the architecture in the form of a UML component diagram.
iii. A Physical View of the architecture showing how components will be deployed on hardware in the form of a UML Deployment Diagram.
Part C - Detailed Design
Show how your architecture will support the critical core use case for the system by developing a detailed design to support that use case. Your design should be consistent with your architecture and respect any component and hardware boundaries. Document your design with:
i. A UML Communication Diagram showing the interaction between user interface, control, and domain object classes for the critical core use case.
ii. A UML Sequence Diagram showing the interaction between user interface, control, and domain object classes for the critical core use case. (10 marks)
iii. A UML Design Class Diagram showing all classes, attributes, methods, and relationships required to support the critical core use case.
Part D - Reflection on Object Oriented Design
Reflect on the design principles you have employed in your architecture and design in a written text of between 800 to 1000 words (between 4 and 5 pages). Make sure your reflection addresses:
a) A discussion of any issues you encountered in deciding on a particular architectural framework or pattern. b) Identifies and discusses any object oriented design principles you applied in your detailed design. c) Identifies and discusses any software design patterns you applied in your detailed design.

Reference no: EM13723295

Questions Cloud

Paper about coaching within organizations : Write a research paper about coaching within organizations. In addition to coaching, what other aspects do you think are necessary for an organization to have an effective performance management system? Why? Conduct research into several different..
Research update for specific information : Upon completion of the Required Readings, write a thorough, well-planned narrative answer to each of the following discussion questions. Rely on your Required Readings and the Lecture and Research Update for specific information to answer each dis..
Types of leader power : Discuss how each of the five (5) types of leader power impact and/or motivate followers. Which of the five types of leader power fall into the category of position power, and which fall into the category of personal power?
What are the components of pki : 1. What are the components of PKI? 2. What is physical security? What are the primary threats to physical security? How are they manifested in attacks against the organization? 3. What are certification and accreditation when applied to informati..
Develop a candidate architecture to meet the functional : Analyse the Case Study documents and develop a candidate architecture to meet the functional and non-functional requirements you have identified in Assignment 1 and Part A of Assignment 2. Document this candidate architecture with:i. An Archite..
Lecture and research update for specific information : Upon completion of the Required Readings, write a thorough, well-planned narrative answer to each of the following discussion questions. Rely on your Required Readings and the Lecture and Research Update for specific information to answer each dis..
How your company activities will affect the environment : Discuss how your company's activities will affect the environment and identify the steps you will take to mitigate any negative impacts
What are the profit-maximizing price and output levels : What are the profit-maximizing price and output levels? Explain them and calculate algebraically for equilibrium P - How much economic profit do you expect that Robert's company will make in the first year?
Use a computer for multimedia : To use a computer for multimedia (moving video and sound), it is important to maximize the efficiency of the I/O. Assume that the blocks of a movie are stored consecutively on a CD-ROM. Describe the steps used to retrieve the blocks for use by the..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which of the following describes a technology

Which of the following describes a technology that delivers electrical power via Ethernet ports? Please select all that apply.

  Use the gaussion elimination algorithms presented

Use the Gaussion elimination algorithms presented in the lecture. Note that arrays in Matlab always start with index 1. (b) Test the function splinemoments with the data set i 0 1 2 xi 0 1 2 yi 0 2 0

  Control recommendation strategies in computer security

Control recommendation strategies in computer security environment. This must be an APA style report with in text citation for example (Stallings, 2012) and I need the reference in APA style at the end.

  How many block of main memory is needed-direct mapped cache

Suppose a computer using direct mapped cache has 2^32 words of main memory and a cache of 1024 blocks, where each cache block contains 32 words. How many block of main memory are there?

  Explain discrete logarithm problem relative to g

Prove that the hardness of the CDH problem relative to G implies the hardness of the discrete logarithm problem relative to G.

  Successfully prevent identity theft

Select an article that details current methods that are used to successfully prevent identity theft. Discuss what security policies commerce should implement to prevent it from happening. Also, address the options users can take to protect th..

  Explain and justify the need for good hcr practice

Demonstrate an alternative screen design for a user with a visual impairment beyond the usability level appropriate for your main design. What would you do to make your app accessible for them?

  Write a select statement that returns four columns

Write a Select statement that returns four columns from the Invoices table, named Number, Total, Credits, and Balance

  Do you agree with the argument made by the business leaders

Do you agree with the argument made by the business leaders

  Storage of an unordered collection of items

Storage of an unordered collection of items that facilitates efficient, random access of items based on an item's position in the collection.

  How entry level manager adjust able to grow into upper level

How do you think an entry level manager has to adjust to be able to grow into an upper level manager

  Program that reads a file of computer data names computers

write a program that reads a file of computer data names computers.txt. creates an array of Computer objects.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd