SlideShare a Scribd company logo
1 of 33
Systems Analysis and DesignSystems Analysis and Design
5th Edition5th Edition
Chapter 8. Architecture DesignChapter 8. Architecture Design
Alan Dennis, Barbara Haley Wixom, and Roberta Roth
8-1© Copyright 2011 John Wiley & Sons, Inc.
Chapter 8 Outline
Elements of an architecture
design.
Creating an architecture design.
Hardware and software
specification.
© Copyright 2011 John Wiley & Sons, Inc. 8-2
INTRODUCTION
 Architecture design
– Plans for how the system will be distributed across
multiple computers and what hardware, operating
system software, and application software will be
used for each computer.
 Key factors in architecture design
– Nonfunctional requirements developed early in the
analysis phase play a key role in architecture design.
 Hardware and software specification
– Defines what hardware and software are needed for
the new system.
© Copyright 2011 John Wiley & Sons, Inc. 8-3
ELEMENTS OF AN ARCHITECTURE
DESIGN
 The objective of architecture design
is to determine how the software
components of the information
system will be assigned to the
hardware devices of the system.
© Copyright 2011 John Wiley & Sons, Inc. 8-4
Architectural Components
 The major architectural components of any system
are the software and the hardware.
 All software systems can be divided into four basic
functions:
- Data storage.
- Data access logic: the processing required to access
stored data.
- Application logic: the logic documented in the DFDs,
use cases, and functional requirements.
- Presentation logic: the display of information to the
user and the acceptance of the user’s commands.
© Copyright 2011 John Wiley & Sons, Inc. 8-5
(cont’d)
The three primary hardware
components:
- Client computers: Input-output devices
employed by users (e.g., PCs, laptops,
handheld devices, smart phones)
- Servers: Larger multi-user computers
used to store software and data.
- The network: Connects the computers.
© Copyright 2011 John Wiley & Sons, Inc. 8-6
Client-Server Architectures
© Copyright 2011 John Wiley & Sons, Inc. 8-7
Client-server architectures balance the
processing between client devices and one or
more server devices.
The client is responsible for the presentation
logic, whereas the server is responsible for the
data access logic and data storage.
A thick or fat client contains all or most of
application logic; whereas a thin client
contains a small portion of the application
logic.
(cont’d)
© Copyright 2011 John Wiley & Sons, Inc. 8-8
(cont’d)
 Client-server architectures have four important
benefits.
- Scalable
- Can support different types of clients and servers
through middleware.
- The presentation logic, the application logic, and the
data processing logic can be independent.
- If a server fails, only the applications requiring that
sever are affected.
 The major limitation of client-server architectures is
their complexity.
© Copyright 2011 John Wiley & Sons, Inc. 8-9
Client-Server Tiers
 There are many ways in which the
application logic can be partitioned
between the client and the server.
The arrangement in Figure 8-1 is
called two-tiered architecture.
© Copyright 2011 John Wiley & Sons, Inc. 8-10
(cont’d)
Three-tiered architecture
© Copyright 2011 John Wiley & Sons, Inc. 8-11
(cont’d)
n-tiered architecture
© Copyright 2011 John Wiley & Sons, Inc. 8-12
Less Common Architectures
Server-Based Architectures
© Copyright 2011 John Wiley & Sons, Inc. 8-13
Client-Based Architectures
© Copyright 2011 John Wiley & Sons, Inc. 8-14
Advances in Architecture
Configurations
Advances in hardware, software, and
networking have given rise to a
number of new architecture options.
- Virtualization.
- Cloud computing.
© Copyright 2011 John Wiley & Sons, Inc. 8-15
Virtualization
 Virtualization refers to a creation of a virtual
device or resource, such as a server or storage
device.
 Server virtualization involves partitioning a
physical server into smaller virtual servers.
 Storage virtualization involves combining
multiple network storage devices into what
appears to be single storage unit.
© Copyright 2011 John Wiley & Sons, Inc. 8-16
Cloud Computing
 Cloud computing – everything from
computing power to computing
infrastructure, applications, business
processes to personal collaboration can be
delivered as a service wherever and whenever
needed.
The “cloud” can be defined as the set of
hardware, networks, storages, devices, and
interfaces that combine to deliver aspects of
computing as a service.© Copyright 2011 John Wiley & Sons, Inc. 8-17
(cont’d)
 Cloud computing can be
implemented in three ways:
- private cloud,
- public cloud, and
- hybrid cloud.
 At this time, cloud computing is in
its early stage of development.
© Copyright 2011 John Wiley & Sons, Inc. 8-18
(cont’d)
 Advantages of cloud computing
1. The resources allocated can be increased or
deceased based on demand.
2. Cloud customers can obtain cloud resources
in a straightforward fashion.
3. Cloud services typically have standardized
APIs (application program interfaces).
4. The cloud computing model enables
customers to be billed for resources as they
are used. © Copyright 2011 John Wiley & Sons, Inc. 8-19
Comparing Architecture Options
Most systems are built to use the existing
infrastructure in the organization, so often
the current infrastructure restricts the
choice of architecture.
Each of the architectures discussed has its
strengths and weaknesses.
Client-server architectures are strongly
favored on the basis of the cost of
infrastructure.
© Copyright 2011 John Wiley & Sons, Inc. 8-20
CREATING AN ARCHITECTURE DESIGN
 Creating an architecture design begins with
the nonfunctional requirements.
Refine the nonfunctional requirements into
more detailed requirements for the
selection of architecture.
The nonfunctional requirements and the
architecture design are used to develop the
hardware and software specification.
© Copyright 2011 John Wiley & Sons, Inc. 8-21
Operational Requirements
© Copyright 2011 John Wiley & Sons, Inc. 8-22
Performance Requirements
© Copyright 2011 John Wiley & Sons, Inc. 8-23
Security Requirements
© Copyright 2011 John Wiley & Sons, Inc. 8-24
Cultural and Political Requirements
© Copyright 2011 John Wiley & Sons, Inc. 8-25
Designing the Architecture
In many cases, the technical environment
requirements as driven by the business
requirements define the application
architecture.
If the technical environment requirements do
not require the choice of a specific
architecture, then other nonfunctional
requirements become important for designing
the architecture.
© Copyright 2011 John Wiley & Sons, Inc. 8-26
(cont’d)
© Copyright 2011 John Wiley & Sons, Inc. 8-27
Nonfunctional Requirements and
Their Implications for Architecture
Design
HARDWARE AND SOFTWARE
SPECIFICATION
The design phase is also the time to
begin selecting and acquiring the
hardware and software that will be
needed for the future system.
The hardware and software
specification is a document that
describes what hardware and software
are needed to support the application.
© Copyright 2011 John Wiley & Sons, Inc. 8-28
(cont’d)
 Sample hardware and software specification
© Copyright 2011 John Wiley & Sons, Inc. 8-29
(cont’d)
 First, you define software
– Define the operating system and any special purpose
software
– Consider additional costs such as training, warranty,
maintenance, licensing agreements.
 Next, you create a list of the hardware needed
– Database servers, network servers, peripheral devices,
clients, backup devices, storage components, and
others.
 Finally, you describe the minimum requirements for
each piece of hardware.
© Copyright 2011 John Wiley & Sons, Inc. 8-30
(cont’d)
Factors in hardware and software selection
© Copyright 2011 John Wiley & Sons, Inc. 8-31
SUMMARY
Application architecture.
- Client-server architecture.
- Advances in architecture configurations:
virtualization and cloud computing.
Architecture Design.
- Nonfunctional requirements.
Hardware and software
specification.
- A document that describes what hardware and
software are needed to support the application.
© Copyright 2011 John Wiley & Sons, Inc. 8-32
Copyright 2011 John Wiley & Sons, Inc.
All rights reserved. Reproduction or translation of this work
beyond that permitted in Section 117 of the 1976 United States
Copyright Act without the express written permission of the
copyright owner is unlawful. Request for further information
should be addressed to the Permissions Department, John Wiley
& Sons, Inc. The purchaser may make back-up copies for his/her
own use only and not for redistribution or resale. The Publisher
assumes no responsibility for errors, omissions, or damages,
caused by the use of these programs or from the use of the
information contained herein.
© Copyright 2011 John Wiley & Sons, Inc. 8-33

More Related Content

What's hot

Software architecture design ppt
Software architecture design pptSoftware architecture design ppt
Software architecture design pptfarazimlak
 
Business information system with explaination
Business information system with explainationBusiness information system with explaination
Business information system with explainationAlana Abraham
 
Architectural views
Architectural viewsArchitectural views
Architectural viewsSaleem Khan
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Introduction To Msbi By Yasir
Introduction To Msbi By YasirIntroduction To Msbi By Yasir
Introduction To Msbi By Yasiryasir873
 
introduction to Web system
introduction to Web systemintroduction to Web system
introduction to Web systemhashim102
 
Software Engineering - Ch11
Software Engineering - Ch11Software Engineering - Ch11
Software Engineering - Ch11Siddharth Ayer
 
Software Engineering - Ch12
Software Engineering - Ch12Software Engineering - Ch12
Software Engineering - Ch12Siddharth Ayer
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and FilteringAisha Talat
 
DBMS - Database Management System
DBMS - Database Management System DBMS - Database Management System
DBMS - Database Management System Krishna Patel
 
System Requirements
System Requirements System Requirements
System Requirements Alaa Al Nouri
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management SystemAAKANKSHA JAIN
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information Systemnayanav
 
System Design Presentation
System Design PresentationSystem Design Presentation
System Design PresentationSCOUT9989
 

What's hot (20)

Software architecture design ppt
Software architecture design pptSoftware architecture design ppt
Software architecture design ppt
 
Business information system with explaination
Business information system with explainationBusiness information system with explaination
Business information system with explaination
 
Architectural views
Architectural viewsArchitectural views
Architectural views
 
Information management
Information managementInformation management
Information management
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Introduction To Msbi By Yasir
Introduction To Msbi By YasirIntroduction To Msbi By Yasir
Introduction To Msbi By Yasir
 
introduction to Web system
introduction to Web systemintroduction to Web system
introduction to Web system
 
Software Engineering - Ch11
Software Engineering - Ch11Software Engineering - Ch11
Software Engineering - Ch11
 
MeeGo Mobile OS
MeeGo Mobile OSMeeGo Mobile OS
MeeGo Mobile OS
 
Software Engineering - Ch12
Software Engineering - Ch12Software Engineering - Ch12
Software Engineering - Ch12
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
DBMS - Database Management System
DBMS - Database Management System DBMS - Database Management System
DBMS - Database Management System
 
Data warehouse physical design
Data warehouse physical designData warehouse physical design
Data warehouse physical design
 
System Requirements
System Requirements System Requirements
System Requirements
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Information filtering
Information filteringInformation filtering
Information filtering
 
Database management system
Database management systemDatabase management system
Database management system
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information System
 
System Design Presentation
System Design PresentationSystem Design Presentation
System Design Presentation
 

Viewers also liked

Viewers also liked (10)

8. pen scratch
8. pen scratch8. pen scratch
8. pen scratch
 
Kebutuhan
KebutuhanKebutuhan
Kebutuhan
 
Anakasus
AnakasusAnakasus
Anakasus
 
Process modelling
Process modellingProcess modelling
Process modelling
 
Datamodelling
DatamodellingDatamodelling
Datamodelling
 
Apsi
ApsiApsi
Apsi
 
Materi pertemuan-2-java dan blue j
Materi pertemuan-2-java dan blue jMateri pertemuan-2-java dan blue j
Materi pertemuan-2-java dan blue j
 
Pbo pertemuan-6-Menggunakan Library
Pbo pertemuan-6-Menggunakan LibraryPbo pertemuan-6-Menggunakan Library
Pbo pertemuan-6-Menggunakan Library
 
Materi pertemuan-4-overloading objek
Materi pertemuan-4-overloading objekMateri pertemuan-4-overloading objek
Materi pertemuan-4-overloading objek
 
10. sensing scratch
10. sensing scratch10. sensing scratch
10. sensing scratch
 

Similar to Ch08-Architecture Design

Hi600 ch08_text_slides
Hi600  ch08_text_slidesHi600  ch08_text_slides
Hi600 ch08_text_slidesljmcneill33
 
Moving into Design.ppt
Moving into Design.pptMoving into Design.ppt
Moving into Design.pptFajar Baskoro
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxRAHUL126667
 
Planning a Tech Refresh with the Right Information
Planning a Tech Refresh with the Right InformationPlanning a Tech Refresh with the Right Information
Planning a Tech Refresh with the Right InformationViridity Software
 
Data Center: New Frontiers - Clive D'Souza
Data Center: New Frontiers - Clive D'SouzaData Center: New Frontiers - Clive D'Souza
Data Center: New Frontiers - Clive D'Souzascoopnewsgroup
 
Point of View -Converged Infrastructure
Point of View -Converged InfrastructurePoint of View -Converged Infrastructure
Point of View -Converged InfrastructureChaitanya Gaajula
 
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined InfrastructureRed Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined InfrastructureIntel® Software
 
Class 3 Architectures of IS
Class 3 Architectures of ISClass 3 Architectures of IS
Class 3 Architectures of ISAneesh Zutshi
 
Session 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.pptSession 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.pptENRIQUE EGLESIAS
 
Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsIntel IoT
 
Towards application development for the internet of things
Towards application development for the internet of thingsTowards application development for the internet of things
Towards application development for the internet of thingsPankesh Patel
 
IT Network Asset Discovery & Inventory
IT Network Asset Discovery & InventoryIT Network Asset Discovery & Inventory
IT Network Asset Discovery & Inventoryikirmer
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...IRJET Journal
 
Data & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless ComputationsData & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless ComputationsSergey Boldyrev
 
SaaS Introduction-May2014
SaaS Introduction-May2014SaaS Introduction-May2014
SaaS Introduction-May2014Nguyen Tung
 

Similar to Ch08-Architecture Design (20)

Hi600 ch08_text_slides
Hi600  ch08_text_slidesHi600  ch08_text_slides
Hi600 ch08_text_slides
 
Moving into Design.ppt
Moving into Design.pptMoving into Design.ppt
Moving into Design.ppt
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
Planning a Tech Refresh with the Right Information
Planning a Tech Refresh with the Right InformationPlanning a Tech Refresh with the Right Information
Planning a Tech Refresh with the Right Information
 
Ch11
Ch11Ch11
Ch11
 
Data Center: New Frontiers - Clive D'Souza
Data Center: New Frontiers - Clive D'SouzaData Center: New Frontiers - Clive D'Souza
Data Center: New Frontiers - Clive D'Souza
 
Ch11
Ch11Ch11
Ch11
 
Point of View -Converged Infrastructure
Point of View -Converged InfrastructurePoint of View -Converged Infrastructure
Point of View -Converged Infrastructure
 
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined InfrastructureRed Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
 
Class 3 Architectures of IS
Class 3 Architectures of ISClass 3 Architectures of IS
Class 3 Architectures of IS
 
Session 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.pptSession 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.ppt
 
Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of Things
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Towards application development for the internet of things
Towards application development for the internet of thingsTowards application development for the internet of things
Towards application development for the internet of things
 
IT Network Asset Discovery & Inventory
IT Network Asset Discovery & InventoryIT Network Asset Discovery & Inventory
IT Network Asset Discovery & Inventory
 
Ch02
Ch02Ch02
Ch02
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
 
Data & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless ComputationsData & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless Computations
 
SaaS Introduction-May2014
SaaS Introduction-May2014SaaS Introduction-May2014
SaaS Introduction-May2014
 

More from Fajar Baskoro

Generasi Terampil Digital Skill-2023.pptx
Generasi Terampil Digital Skill-2023.pptxGenerasi Terampil Digital Skill-2023.pptx
Generasi Terampil Digital Skill-2023.pptxFajar Baskoro
 
Cara Membuat Kursus Online Wordpress-tutorstarter
Cara Membuat Kursus Online Wordpress-tutorstarterCara Membuat Kursus Online Wordpress-tutorstarter
Cara Membuat Kursus Online Wordpress-tutorstarterFajar Baskoro
 
PPT-Kick Off Double Track 2024 melaksanakan Festival Ramadhan
PPT-Kick Off Double Track 2024 melaksanakan Festival RamadhanPPT-Kick Off Double Track 2024 melaksanakan Festival Ramadhan
PPT-Kick Off Double Track 2024 melaksanakan Festival RamadhanFajar Baskoro
 
Buku Inovasi 2023 - 2024 konsep capaian KUS
Buku Inovasi 2023 - 2024 konsep capaian  KUSBuku Inovasi 2023 - 2024 konsep capaian  KUS
Buku Inovasi 2023 - 2024 konsep capaian KUSFajar Baskoro
 
Pemaparan Sosialisasi Program Dual Track 2024.pptx
Pemaparan Sosialisasi Program Dual Track 2024.pptxPemaparan Sosialisasi Program Dual Track 2024.pptx
Pemaparan Sosialisasi Program Dual Track 2024.pptxFajar Baskoro
 
Executive Millennial Entrepreneur Award 2023-1a-1.pdf
Executive Millennial Entrepreneur Award  2023-1a-1.pdfExecutive Millennial Entrepreneur Award  2023-1a-1.pdf
Executive Millennial Entrepreneur Award 2023-1a-1.pdfFajar Baskoro
 
1-Executive Millennial Entrepreneur Award 2023-1-cetak.pptx
1-Executive Millennial Entrepreneur Award  2023-1-cetak.pptx1-Executive Millennial Entrepreneur Award  2023-1-cetak.pptx
1-Executive Millennial Entrepreneur Award 2023-1-cetak.pptxFajar Baskoro
 
Executive Millennial Entrepreneur Award 2023-1.pptx
Executive Millennial Entrepreneur Award  2023-1.pptxExecutive Millennial Entrepreneur Award  2023-1.pptx
Executive Millennial Entrepreneur Award 2023-1.pptxFajar Baskoro
 
Pemrograman Mobile - JetPack Compose1.pptx
Pemrograman Mobile - JetPack Compose1.pptxPemrograman Mobile - JetPack Compose1.pptx
Pemrograman Mobile - JetPack Compose1.pptxFajar Baskoro
 
Evaluasi KPP Program Dual Track Provinsi Kaltim
Evaluasi KPP Program Dual Track Provinsi KaltimEvaluasi KPP Program Dual Track Provinsi Kaltim
Evaluasi KPP Program Dual Track Provinsi KaltimFajar Baskoro
 
foto tenda digital skill program dari sekolah
foto tenda digital skill program dari sekolahfoto tenda digital skill program dari sekolah
foto tenda digital skill program dari sekolahFajar Baskoro
 
Meraih Peluang di Gig Economy yang cocok bagi remaja
Meraih Peluang di Gig Economy yang cocok bagi remajaMeraih Peluang di Gig Economy yang cocok bagi remaja
Meraih Peluang di Gig Economy yang cocok bagi remajaFajar Baskoro
 
Membangun aplikasi mobile dengan Appsheet
Membangun aplikasi mobile dengan AppsheetMembangun aplikasi mobile dengan Appsheet
Membangun aplikasi mobile dengan AppsheetFajar Baskoro
 
Transition education to employment.pdf
Transition education to employment.pdfTransition education to employment.pdf
Transition education to employment.pdfFajar Baskoro
 

More from Fajar Baskoro (20)

Generasi Terampil Digital Skill-2023.pptx
Generasi Terampil Digital Skill-2023.pptxGenerasi Terampil Digital Skill-2023.pptx
Generasi Terampil Digital Skill-2023.pptx
 
Cara Membuat Kursus Online Wordpress-tutorstarter
Cara Membuat Kursus Online Wordpress-tutorstarterCara Membuat Kursus Online Wordpress-tutorstarter
Cara Membuat Kursus Online Wordpress-tutorstarter
 
PPT-Kick Off Double Track 2024 melaksanakan Festival Ramadhan
PPT-Kick Off Double Track 2024 melaksanakan Festival RamadhanPPT-Kick Off Double Track 2024 melaksanakan Festival Ramadhan
PPT-Kick Off Double Track 2024 melaksanakan Festival Ramadhan
 
Buku Inovasi 2023 - 2024 konsep capaian KUS
Buku Inovasi 2023 - 2024 konsep capaian  KUSBuku Inovasi 2023 - 2024 konsep capaian  KUS
Buku Inovasi 2023 - 2024 konsep capaian KUS
 
Pemaparan Sosialisasi Program Dual Track 2024.pptx
Pemaparan Sosialisasi Program Dual Track 2024.pptxPemaparan Sosialisasi Program Dual Track 2024.pptx
Pemaparan Sosialisasi Program Dual Track 2024.pptx
 
Executive Millennial Entrepreneur Award 2023-1a-1.pdf
Executive Millennial Entrepreneur Award  2023-1a-1.pdfExecutive Millennial Entrepreneur Award  2023-1a-1.pdf
Executive Millennial Entrepreneur Award 2023-1a-1.pdf
 
1-Executive Millennial Entrepreneur Award 2023-1-cetak.pptx
1-Executive Millennial Entrepreneur Award  2023-1-cetak.pptx1-Executive Millennial Entrepreneur Award  2023-1-cetak.pptx
1-Executive Millennial Entrepreneur Award 2023-1-cetak.pptx
 
Executive Millennial Entrepreneur Award 2023-1.pptx
Executive Millennial Entrepreneur Award  2023-1.pptxExecutive Millennial Entrepreneur Award  2023-1.pptx
Executive Millennial Entrepreneur Award 2023-1.pptx
 
Pemrograman Mobile - JetPack Compose1.pptx
Pemrograman Mobile - JetPack Compose1.pptxPemrograman Mobile - JetPack Compose1.pptx
Pemrograman Mobile - JetPack Compose1.pptx
 
Evaluasi KPP Program Dual Track Provinsi Kaltim
Evaluasi KPP Program Dual Track Provinsi KaltimEvaluasi KPP Program Dual Track Provinsi Kaltim
Evaluasi KPP Program Dual Track Provinsi Kaltim
 
foto tenda digital skill program dari sekolah
foto tenda digital skill program dari sekolahfoto tenda digital skill program dari sekolah
foto tenda digital skill program dari sekolah
 
Meraih Peluang di Gig Economy yang cocok bagi remaja
Meraih Peluang di Gig Economy yang cocok bagi remajaMeraih Peluang di Gig Economy yang cocok bagi remaja
Meraih Peluang di Gig Economy yang cocok bagi remaja
 
Membangun aplikasi mobile dengan Appsheet
Membangun aplikasi mobile dengan AppsheetMembangun aplikasi mobile dengan Appsheet
Membangun aplikasi mobile dengan Appsheet
 
epl1.pdf
epl1.pdfepl1.pdf
epl1.pdf
 
user.docx
user.docxuser.docx
user.docx
 
Dtmart.pptx
Dtmart.pptxDtmart.pptx
Dtmart.pptx
 
DualTrack-2023.pptx
DualTrack-2023.pptxDualTrack-2023.pptx
DualTrack-2023.pptx
 
BADGE.pptx
BADGE.pptxBADGE.pptx
BADGE.pptx
 
womenatwork.pdf
womenatwork.pdfwomenatwork.pdf
womenatwork.pdf
 
Transition education to employment.pdf
Transition education to employment.pdfTransition education to employment.pdf
Transition education to employment.pdf
 

Recently uploaded

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 

Recently uploaded (20)

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 

Ch08-Architecture Design

  • 1. Systems Analysis and DesignSystems Analysis and Design 5th Edition5th Edition Chapter 8. Architecture DesignChapter 8. Architecture Design Alan Dennis, Barbara Haley Wixom, and Roberta Roth 8-1© Copyright 2011 John Wiley & Sons, Inc.
  • 2. Chapter 8 Outline Elements of an architecture design. Creating an architecture design. Hardware and software specification. © Copyright 2011 John Wiley & Sons, Inc. 8-2
  • 3. INTRODUCTION  Architecture design – Plans for how the system will be distributed across multiple computers and what hardware, operating system software, and application software will be used for each computer.  Key factors in architecture design – Nonfunctional requirements developed early in the analysis phase play a key role in architecture design.  Hardware and software specification – Defines what hardware and software are needed for the new system. © Copyright 2011 John Wiley & Sons, Inc. 8-3
  • 4. ELEMENTS OF AN ARCHITECTURE DESIGN  The objective of architecture design is to determine how the software components of the information system will be assigned to the hardware devices of the system. © Copyright 2011 John Wiley & Sons, Inc. 8-4
  • 5. Architectural Components  The major architectural components of any system are the software and the hardware.  All software systems can be divided into four basic functions: - Data storage. - Data access logic: the processing required to access stored data. - Application logic: the logic documented in the DFDs, use cases, and functional requirements. - Presentation logic: the display of information to the user and the acceptance of the user’s commands. © Copyright 2011 John Wiley & Sons, Inc. 8-5
  • 6. (cont’d) The three primary hardware components: - Client computers: Input-output devices employed by users (e.g., PCs, laptops, handheld devices, smart phones) - Servers: Larger multi-user computers used to store software and data. - The network: Connects the computers. © Copyright 2011 John Wiley & Sons, Inc. 8-6
  • 7. Client-Server Architectures © Copyright 2011 John Wiley & Sons, Inc. 8-7 Client-server architectures balance the processing between client devices and one or more server devices. The client is responsible for the presentation logic, whereas the server is responsible for the data access logic and data storage. A thick or fat client contains all or most of application logic; whereas a thin client contains a small portion of the application logic.
  • 8. (cont’d) © Copyright 2011 John Wiley & Sons, Inc. 8-8
  • 9. (cont’d)  Client-server architectures have four important benefits. - Scalable - Can support different types of clients and servers through middleware. - The presentation logic, the application logic, and the data processing logic can be independent. - If a server fails, only the applications requiring that sever are affected.  The major limitation of client-server architectures is their complexity. © Copyright 2011 John Wiley & Sons, Inc. 8-9
  • 10. Client-Server Tiers  There are many ways in which the application logic can be partitioned between the client and the server. The arrangement in Figure 8-1 is called two-tiered architecture. © Copyright 2011 John Wiley & Sons, Inc. 8-10
  • 11. (cont’d) Three-tiered architecture © Copyright 2011 John Wiley & Sons, Inc. 8-11
  • 12. (cont’d) n-tiered architecture © Copyright 2011 John Wiley & Sons, Inc. 8-12
  • 13. Less Common Architectures Server-Based Architectures © Copyright 2011 John Wiley & Sons, Inc. 8-13
  • 14. Client-Based Architectures © Copyright 2011 John Wiley & Sons, Inc. 8-14
  • 15. Advances in Architecture Configurations Advances in hardware, software, and networking have given rise to a number of new architecture options. - Virtualization. - Cloud computing. © Copyright 2011 John Wiley & Sons, Inc. 8-15
  • 16. Virtualization  Virtualization refers to a creation of a virtual device or resource, such as a server or storage device.  Server virtualization involves partitioning a physical server into smaller virtual servers.  Storage virtualization involves combining multiple network storage devices into what appears to be single storage unit. © Copyright 2011 John Wiley & Sons, Inc. 8-16
  • 17. Cloud Computing  Cloud computing – everything from computing power to computing infrastructure, applications, business processes to personal collaboration can be delivered as a service wherever and whenever needed. The “cloud” can be defined as the set of hardware, networks, storages, devices, and interfaces that combine to deliver aspects of computing as a service.© Copyright 2011 John Wiley & Sons, Inc. 8-17
  • 18. (cont’d)  Cloud computing can be implemented in three ways: - private cloud, - public cloud, and - hybrid cloud.  At this time, cloud computing is in its early stage of development. © Copyright 2011 John Wiley & Sons, Inc. 8-18
  • 19. (cont’d)  Advantages of cloud computing 1. The resources allocated can be increased or deceased based on demand. 2. Cloud customers can obtain cloud resources in a straightforward fashion. 3. Cloud services typically have standardized APIs (application program interfaces). 4. The cloud computing model enables customers to be billed for resources as they are used. © Copyright 2011 John Wiley & Sons, Inc. 8-19
  • 20. Comparing Architecture Options Most systems are built to use the existing infrastructure in the organization, so often the current infrastructure restricts the choice of architecture. Each of the architectures discussed has its strengths and weaknesses. Client-server architectures are strongly favored on the basis of the cost of infrastructure. © Copyright 2011 John Wiley & Sons, Inc. 8-20
  • 21. CREATING AN ARCHITECTURE DESIGN  Creating an architecture design begins with the nonfunctional requirements. Refine the nonfunctional requirements into more detailed requirements for the selection of architecture. The nonfunctional requirements and the architecture design are used to develop the hardware and software specification. © Copyright 2011 John Wiley & Sons, Inc. 8-21
  • 22. Operational Requirements © Copyright 2011 John Wiley & Sons, Inc. 8-22
  • 23. Performance Requirements © Copyright 2011 John Wiley & Sons, Inc. 8-23
  • 24. Security Requirements © Copyright 2011 John Wiley & Sons, Inc. 8-24
  • 25. Cultural and Political Requirements © Copyright 2011 John Wiley & Sons, Inc. 8-25
  • 26. Designing the Architecture In many cases, the technical environment requirements as driven by the business requirements define the application architecture. If the technical environment requirements do not require the choice of a specific architecture, then other nonfunctional requirements become important for designing the architecture. © Copyright 2011 John Wiley & Sons, Inc. 8-26
  • 27. (cont’d) © Copyright 2011 John Wiley & Sons, Inc. 8-27 Nonfunctional Requirements and Their Implications for Architecture Design
  • 28. HARDWARE AND SOFTWARE SPECIFICATION The design phase is also the time to begin selecting and acquiring the hardware and software that will be needed for the future system. The hardware and software specification is a document that describes what hardware and software are needed to support the application. © Copyright 2011 John Wiley & Sons, Inc. 8-28
  • 29. (cont’d)  Sample hardware and software specification © Copyright 2011 John Wiley & Sons, Inc. 8-29
  • 30. (cont’d)  First, you define software – Define the operating system and any special purpose software – Consider additional costs such as training, warranty, maintenance, licensing agreements.  Next, you create a list of the hardware needed – Database servers, network servers, peripheral devices, clients, backup devices, storage components, and others.  Finally, you describe the minimum requirements for each piece of hardware. © Copyright 2011 John Wiley & Sons, Inc. 8-30
  • 31. (cont’d) Factors in hardware and software selection © Copyright 2011 John Wiley & Sons, Inc. 8-31
  • 32. SUMMARY Application architecture. - Client-server architecture. - Advances in architecture configurations: virtualization and cloud computing. Architecture Design. - Nonfunctional requirements. Hardware and software specification. - A document that describes what hardware and software are needed to support the application. © Copyright 2011 John Wiley & Sons, Inc. 8-32
  • 33. Copyright 2011 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for redistribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein. © Copyright 2011 John Wiley & Sons, Inc. 8-33