尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Systems Analysis and DesignSystems Analysis and Design
5th Edition5th Edition
Chapter 8. Architecture DesignChapter 8. Architecture Design
Alan Dennis, Barbara Haley Wixom, and Roberta Roth
8-1© Copyright 2011 John Wiley & Sons, Inc.
Chapter 8 Outline
Elements of an architecture
design.
Creating an architecture design.
Hardware and software
specification.
© Copyright 2011 John Wiley & Sons, Inc. 8-2
INTRODUCTION
 Architecture design
– Plans for how the system will be distributed across
multiple computers and what hardware, operating
system software, and application software will be
used for each computer.
 Key factors in architecture design
– Nonfunctional requirements developed early in the
analysis phase play a key role in architecture design.
 Hardware and software specification
– Defines what hardware and software are needed for
the new system.
© Copyright 2011 John Wiley & Sons, Inc. 8-3
ELEMENTS OF AN ARCHITECTURE
DESIGN
 The objective of architecture design
is to determine how the software
components of the information
system will be assigned to the
hardware devices of the system.
© Copyright 2011 John Wiley & Sons, Inc. 8-4
Architectural Components
 The major architectural components of any system
are the software and the hardware.
 All software systems can be divided into four basic
functions:
- Data storage.
- Data access logic: the processing required to access
stored data.
- Application logic: the logic documented in the DFDs,
use cases, and functional requirements.
- Presentation logic: the display of information to the
user and the acceptance of the user’s commands.
© Copyright 2011 John Wiley & Sons, Inc. 8-5
(cont’d)
The three primary hardware
components:
- Client computers: Input-output devices
employed by users (e.g., PCs, laptops,
handheld devices, smart phones)
- Servers: Larger multi-user computers
used to store software and data.
- The network: Connects the computers.
© Copyright 2011 John Wiley & Sons, Inc. 8-6
Client-Server Architectures
© Copyright 2011 John Wiley & Sons, Inc. 8-7
Client-server architectures balance the
processing between client devices and one or
more server devices.
The client is responsible for the presentation
logic, whereas the server is responsible for the
data access logic and data storage.
A thick or fat client contains all or most of
application logic; whereas a thin client
contains a small portion of the application
logic.
(cont’d)
© Copyright 2011 John Wiley & Sons, Inc. 8-8
(cont’d)
 Client-server architectures have four important
benefits.
- Scalable
- Can support different types of clients and servers
through middleware.
- The presentation logic, the application logic, and the
data processing logic can be independent.
- If a server fails, only the applications requiring that
sever are affected.
 The major limitation of client-server architectures is
their complexity.
© Copyright 2011 John Wiley & Sons, Inc. 8-9
Client-Server Tiers
 There are many ways in which the
application logic can be partitioned
between the client and the server.
The arrangement in Figure 8-1 is
called two-tiered architecture.
© Copyright 2011 John Wiley & Sons, Inc. 8-10
(cont’d)
Three-tiered architecture
© Copyright 2011 John Wiley & Sons, Inc. 8-11
(cont’d)
n-tiered architecture
© Copyright 2011 John Wiley & Sons, Inc. 8-12
Less Common Architectures
Server-Based Architectures
© Copyright 2011 John Wiley & Sons, Inc. 8-13
Client-Based Architectures
© Copyright 2011 John Wiley & Sons, Inc. 8-14
Advances in Architecture
Configurations
Advances in hardware, software, and
networking have given rise to a
number of new architecture options.
- Virtualization.
- Cloud computing.
© Copyright 2011 John Wiley & Sons, Inc. 8-15
Virtualization
 Virtualization refers to a creation of a virtual
device or resource, such as a server or storage
device.
 Server virtualization involves partitioning a
physical server into smaller virtual servers.
 Storage virtualization involves combining
multiple network storage devices into what
appears to be single storage unit.
© Copyright 2011 John Wiley & Sons, Inc. 8-16
Cloud Computing
 Cloud computing – everything from
computing power to computing
infrastructure, applications, business
processes to personal collaboration can be
delivered as a service wherever and whenever
needed.
The “cloud” can be defined as the set of
hardware, networks, storages, devices, and
interfaces that combine to deliver aspects of
computing as a service.© Copyright 2011 John Wiley & Sons, Inc. 8-17
(cont’d)
 Cloud computing can be
implemented in three ways:
- private cloud,
- public cloud, and
- hybrid cloud.
 At this time, cloud computing is in
its early stage of development.
© Copyright 2011 John Wiley & Sons, Inc. 8-18
(cont’d)
 Advantages of cloud computing
1. The resources allocated can be increased or
deceased based on demand.
2. Cloud customers can obtain cloud resources
in a straightforward fashion.
3. Cloud services typically have standardized
APIs (application program interfaces).
4. The cloud computing model enables
customers to be billed for resources as they
are used. © Copyright 2011 John Wiley & Sons, Inc. 8-19
Comparing Architecture Options
Most systems are built to use the existing
infrastructure in the organization, so often
the current infrastructure restricts the
choice of architecture.
Each of the architectures discussed has its
strengths and weaknesses.
Client-server architectures are strongly
favored on the basis of the cost of
infrastructure.
© Copyright 2011 John Wiley & Sons, Inc. 8-20
CREATING AN ARCHITECTURE DESIGN
 Creating an architecture design begins with
the nonfunctional requirements.
Refine the nonfunctional requirements into
more detailed requirements for the
selection of architecture.
The nonfunctional requirements and the
architecture design are used to develop the
hardware and software specification.
© Copyright 2011 John Wiley & Sons, Inc. 8-21
Operational Requirements
© Copyright 2011 John Wiley & Sons, Inc. 8-22
Performance Requirements
© Copyright 2011 John Wiley & Sons, Inc. 8-23
Security Requirements
© Copyright 2011 John Wiley & Sons, Inc. 8-24
Cultural and Political Requirements
© Copyright 2011 John Wiley & Sons, Inc. 8-25
Designing the Architecture
In many cases, the technical environment
requirements as driven by the business
requirements define the application
architecture.
If the technical environment requirements do
not require the choice of a specific
architecture, then other nonfunctional
requirements become important for designing
the architecture.
© Copyright 2011 John Wiley & Sons, Inc. 8-26
(cont’d)
© Copyright 2011 John Wiley & Sons, Inc. 8-27
Nonfunctional Requirements and
Their Implications for Architecture
Design
HARDWARE AND SOFTWARE
SPECIFICATION
The design phase is also the time to
begin selecting and acquiring the
hardware and software that will be
needed for the future system.
The hardware and software
specification is a document that
describes what hardware and software
are needed to support the application.
© Copyright 2011 John Wiley & Sons, Inc. 8-28
(cont’d)
 Sample hardware and software specification
© Copyright 2011 John Wiley & Sons, Inc. 8-29
(cont’d)
 First, you define software
– Define the operating system and any special purpose
software
– Consider additional costs such as training, warranty,
maintenance, licensing agreements.
 Next, you create a list of the hardware needed
– Database servers, network servers, peripheral devices,
clients, backup devices, storage components, and
others.
 Finally, you describe the minimum requirements for
each piece of hardware.
© Copyright 2011 John Wiley & Sons, Inc. 8-30
(cont’d)
Factors in hardware and software selection
© Copyright 2011 John Wiley & Sons, Inc. 8-31
SUMMARY
Application architecture.
- Client-server architecture.
- Advances in architecture configurations:
virtualization and cloud computing.
Architecture Design.
- Nonfunctional requirements.
Hardware and software
specification.
- A document that describes what hardware and
software are needed to support the application.
© Copyright 2011 John Wiley & Sons, Inc. 8-32
Copyright 2011 John Wiley & Sons, Inc.
All rights reserved. Reproduction or translation of this work
beyond that permitted in Section 117 of the 1976 United States
Copyright Act without the express written permission of the
copyright owner is unlawful. Request for further information
should be addressed to the Permissions Department, John Wiley
& Sons, Inc. The purchaser may make back-up copies for his/her
own use only and not for redistribution or resale. The Publisher
assumes no responsibility for errors, omissions, or damages,
caused by the use of these programs or from the use of the
information contained herein.
© Copyright 2011 John Wiley & Sons, Inc. 8-33

More Related Content

What's hot

Slides chapter 9
Slides chapter 9Slides chapter 9
Slides chapter 9
Priyanka Shetty
 
Ch19 systems engineering
Ch19 systems engineeringCh19 systems engineering
Ch19 systems engineering
software-engineering-book
 
Chapter 1 introduction
Chapter 1 introductionChapter 1 introduction
Chapter 1 introduction
Piyush Gogia
 
Ian Sommerville, Software Engineering, 9th EditionCh 8
Ian Sommerville,  Software Engineering, 9th EditionCh 8Ian Sommerville,  Software Engineering, 9th EditionCh 8
Ian Sommerville, Software Engineering, 9th EditionCh 8
Mohammed Romi
 
Software design
Software designSoftware design
Slides chapter 10
Slides chapter 10Slides chapter 10
Slides chapter 10
Priyanka Shetty
 
Ian Sommerville, Software Engineering, 9th Edition Ch2
Ian Sommerville,  Software Engineering, 9th Edition Ch2Ian Sommerville,  Software Engineering, 9th Edition Ch2
Ian Sommerville, Software Engineering, 9th Edition Ch2
Mohammed Romi
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1
Mohammed Romi
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-Engineering
Saqib Raza
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9
Ian Sommerville
 
Ch16 component based software engineering
Ch16 component based software engineeringCh16 component based software engineering
Ch16 component based software engineering
software-engineering-book
 
Less06 networking
Less06 networkingLess06 networking
Less06 networking
Amit Bhalla
 
Ch15 software reuse
Ch15 software reuseCh15 software reuse
Ch15 software reuse
software-engineering-book
 
User Interface Design
User Interface DesignUser Interface Design
User Interface Design
JReifman
 
Component based software engineering
Component based software engineeringComponent based software engineering
Component based software engineering
Charotar University Of Science And Technology,Gujrat
 
software characteristics
software characteristicssoftware characteristics
software characteristics
Muhammad Sikandar Mustafa
 
Component based software development
Component based software developmentComponent based software development
Component based software development
Emmanuel Fuchs
 
Ch09-User Interface Design
Ch09-User Interface DesignCh09-User Interface Design
Ch09-User Interface Design
Fajar Baskoro
 
Software engineering
Software engineeringSoftware engineering
Software engineering
Hitesh Mohapatra
 
5. ch 4-principles that guide practice
5. ch 4-principles that guide practice5. ch 4-principles that guide practice
5. ch 4-principles that guide practice
Delowar hossain
 

What's hot (20)

Slides chapter 9
Slides chapter 9Slides chapter 9
Slides chapter 9
 
Ch19 systems engineering
Ch19 systems engineeringCh19 systems engineering
Ch19 systems engineering
 
Chapter 1 introduction
Chapter 1 introductionChapter 1 introduction
Chapter 1 introduction
 
Ian Sommerville, Software Engineering, 9th EditionCh 8
Ian Sommerville,  Software Engineering, 9th EditionCh 8Ian Sommerville,  Software Engineering, 9th EditionCh 8
Ian Sommerville, Software Engineering, 9th EditionCh 8
 
Software design
Software designSoftware design
Software design
 
Slides chapter 10
Slides chapter 10Slides chapter 10
Slides chapter 10
 
Ian Sommerville, Software Engineering, 9th Edition Ch2
Ian Sommerville,  Software Engineering, 9th Edition Ch2Ian Sommerville,  Software Engineering, 9th Edition Ch2
Ian Sommerville, Software Engineering, 9th Edition Ch2
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-Engineering
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9
 
Ch16 component based software engineering
Ch16 component based software engineeringCh16 component based software engineering
Ch16 component based software engineering
 
Less06 networking
Less06 networkingLess06 networking
Less06 networking
 
Ch15 software reuse
Ch15 software reuseCh15 software reuse
Ch15 software reuse
 
User Interface Design
User Interface DesignUser Interface Design
User Interface Design
 
Component based software engineering
Component based software engineeringComponent based software engineering
Component based software engineering
 
software characteristics
software characteristicssoftware characteristics
software characteristics
 
Component based software development
Component based software developmentComponent based software development
Component based software development
 
Ch09-User Interface Design
Ch09-User Interface DesignCh09-User Interface Design
Ch09-User Interface Design
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
5. ch 4-principles that guide practice
5. ch 4-principles that guide practice5. ch 4-principles that guide practice
5. ch 4-principles that guide practice
 

Viewers also liked

Ch11-Data Storage Design
Ch11-Data Storage DesignCh11-Data Storage Design
Ch11-Data Storage Design
Fajar Baskoro
 
8. pen scratch
8. pen scratch8. pen scratch
8. pen scratch
Fajar Baskoro
 
Kebutuhan
KebutuhanKebutuhan
Kebutuhan
Fajar Baskoro
 
Anakasus
AnakasusAnakasus
Anakasus
Fajar Baskoro
 
Process modelling
Process modellingProcess modelling
Process modelling
Fajar Baskoro
 
Datamodelling
DatamodellingDatamodelling
Datamodelling
Fajar Baskoro
 
Materi pertemuan-2-java dan blue j
Materi pertemuan-2-java dan blue jMateri pertemuan-2-java dan blue j
Materi pertemuan-2-java dan blue j
Fajar Baskoro
 
Pbo pertemuan-6-Menggunakan Library
Pbo pertemuan-6-Menggunakan LibraryPbo pertemuan-6-Menggunakan Library
Pbo pertemuan-6-Menggunakan Library
Fajar Baskoro
 
Materi pertemuan-4-overloading objek
Materi pertemuan-4-overloading objekMateri pertemuan-4-overloading objek
Materi pertemuan-4-overloading objek
Fajar Baskoro
 
10. sensing scratch
10. sensing scratch10. sensing scratch
10. sensing scratch
Fajar Baskoro
 

Viewers also liked (11)

Ch11-Data Storage Design
Ch11-Data Storage DesignCh11-Data Storage Design
Ch11-Data Storage Design
 
8. pen scratch
8. pen scratch8. pen scratch
8. pen scratch
 
Kebutuhan
KebutuhanKebutuhan
Kebutuhan
 
Anakasus
AnakasusAnakasus
Anakasus
 
Process modelling
Process modellingProcess modelling
Process modelling
 
Datamodelling
DatamodellingDatamodelling
Datamodelling
 
Apsi
ApsiApsi
Apsi
 
Materi pertemuan-2-java dan blue j
Materi pertemuan-2-java dan blue jMateri pertemuan-2-java dan blue j
Materi pertemuan-2-java dan blue j
 
Pbo pertemuan-6-Menggunakan Library
Pbo pertemuan-6-Menggunakan LibraryPbo pertemuan-6-Menggunakan Library
Pbo pertemuan-6-Menggunakan Library
 
Materi pertemuan-4-overloading objek
Materi pertemuan-4-overloading objekMateri pertemuan-4-overloading objek
Materi pertemuan-4-overloading objek
 
10. sensing scratch
10. sensing scratch10. sensing scratch
10. sensing scratch
 

Similar to Ch08-Architecture Design

Hi600 ch08_text_slides
Hi600  ch08_text_slidesHi600  ch08_text_slides
Hi600 ch08_text_slides
ljmcneill33
 
Moving into Design.ppt
Moving into Design.pptMoving into Design.ppt
Moving into Design.ppt
Fajar Baskoro
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
RAHUL126667
 
Planning a Tech Refresh with the Right Information
Planning a Tech Refresh with the Right InformationPlanning a Tech Refresh with the Right Information
Planning a Tech Refresh with the Right Information
Viridity Software
 
Ch11
Ch11Ch11
Ch11
kelasapa
 
Data Center: New Frontiers - Clive D'Souza
Data Center: New Frontiers - Clive D'SouzaData Center: New Frontiers - Clive D'Souza
Data Center: New Frontiers - Clive D'Souza
scoopnewsgroup
 
Ch11
Ch11Ch11
Point of View -Converged Infrastructure
Point of View -Converged InfrastructurePoint of View -Converged Infrastructure
Point of View -Converged Infrastructure
Chaitanya Gaajula
 
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined InfrastructureRed Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Intel® Software
 
Class 3 Architectures of IS
Class 3 Architectures of ISClass 3 Architectures of IS
Class 3 Architectures of IS
Aneesh Zutshi
 
Session 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.pptSession 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.ppt
ENRIQUE EGLESIAS
 
Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of Things
Intel IoT
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Rohit Bansal
 
Towards application development for the internet of things
Towards application development for the internet of thingsTowards application development for the internet of things
Towards application development for the internet of things
Pankesh Patel
 
IT Network Asset Discovery & Inventory
IT Network Asset Discovery & InventoryIT Network Asset Discovery & Inventory
IT Network Asset Discovery & Inventory
ikirmer
 
Ch02
Ch02Ch02
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
Nil Menon
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET Journal
 
Data & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless ComputationsData & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless Computations
Sergey Boldyrev
 
SaaS Introduction-May2014
SaaS Introduction-May2014SaaS Introduction-May2014
SaaS Introduction-May2014
Nguyen Tung
 

Similar to Ch08-Architecture Design (20)

Hi600 ch08_text_slides
Hi600  ch08_text_slidesHi600  ch08_text_slides
Hi600 ch08_text_slides
 
Moving into Design.ppt
Moving into Design.pptMoving into Design.ppt
Moving into Design.ppt
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
Planning a Tech Refresh with the Right Information
Planning a Tech Refresh with the Right InformationPlanning a Tech Refresh with the Right Information
Planning a Tech Refresh with the Right Information
 
Ch11
Ch11Ch11
Ch11
 
Data Center: New Frontiers - Clive D'Souza
Data Center: New Frontiers - Clive D'SouzaData Center: New Frontiers - Clive D'Souza
Data Center: New Frontiers - Clive D'Souza
 
Ch11
Ch11Ch11
Ch11
 
Point of View -Converged Infrastructure
Point of View -Converged InfrastructurePoint of View -Converged Infrastructure
Point of View -Converged Infrastructure
 
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined InfrastructureRed Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
 
Class 3 Architectures of IS
Class 3 Architectures of ISClass 3 Architectures of IS
Class 3 Architectures of IS
 
Session 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.pptSession 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.ppt
 
Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of Things
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Towards application development for the internet of things
Towards application development for the internet of thingsTowards application development for the internet of things
Towards application development for the internet of things
 
IT Network Asset Discovery & Inventory
IT Network Asset Discovery & InventoryIT Network Asset Discovery & Inventory
IT Network Asset Discovery & Inventory
 
Ch02
Ch02Ch02
Ch02
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
 
Data & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless ComputationsData & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless Computations
 
SaaS Introduction-May2014
SaaS Introduction-May2014SaaS Introduction-May2014
SaaS Introduction-May2014
 

More from Fajar Baskoro

Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Pemberdayaan Kelompok Usaha Siswa dengan Tools Wirausaha AI.pdf
Pemberdayaan Kelompok Usaha Siswa dengan Tools Wirausaha AI.pdfPemberdayaan Kelompok Usaha Siswa dengan Tools Wirausaha AI.pdf
Pemberdayaan Kelompok Usaha Siswa dengan Tools Wirausaha AI.pdf
Fajar Baskoro
 
Skills for The Future - Pemberdayaan Remaja Untuk Meningkatkan Keterampilan.pptx
Skills for The Future - Pemberdayaan Remaja Untuk Meningkatkan Keterampilan.pptxSkills for The Future - Pemberdayaan Remaja Untuk Meningkatkan Keterampilan.pptx
Skills for The Future - Pemberdayaan Remaja Untuk Meningkatkan Keterampilan.pptx
Fajar Baskoro
 
Slides OOSC - Program Penanganan ATS Unicef Bappeda Jawa Timur.pptx
Slides OOSC - Program Penanganan ATS Unicef Bappeda Jawa Timur.pptxSlides OOSC - Program Penanganan ATS Unicef Bappeda Jawa Timur.pptx
Slides OOSC - Program Penanganan ATS Unicef Bappeda Jawa Timur.pptx
Fajar Baskoro
 
PPT- Menyiapkan GenerasiTerampilDigitalSkill1.pptx
PPT- Menyiapkan GenerasiTerampilDigitalSkill1.pptxPPT- Menyiapkan GenerasiTerampilDigitalSkill1.pptx
PPT- Menyiapkan GenerasiTerampilDigitalSkill1.pptx
Fajar Baskoro
 
PPT-Menyiapkan Alumni GenerasiTerampil.pptx
PPT-Menyiapkan Alumni GenerasiTerampil.pptxPPT-Menyiapkan Alumni GenerasiTerampil.pptx
PPT-Menyiapkan Alumni GenerasiTerampil.pptx
Fajar Baskoro
 
RIngkasan Program - Markoding Innovation Challenge.pptx
RIngkasan Program - Markoding Innovation Challenge.pptxRIngkasan Program - Markoding Innovation Challenge.pptx
RIngkasan Program - Markoding Innovation Challenge.pptx
Fajar Baskoro
 
Pengembangan Program Pelatihan Double Track - DT PLUSK
Pengembangan Program Pelatihan Double Track - DT PLUSKPengembangan Program Pelatihan Double Track - DT PLUSK
Pengembangan Program Pelatihan Double Track - DT PLUSK
Fajar Baskoro
 
DT-PLUSK Pengembangan SMA Double Track Tahun ke 5
DT-PLUSK Pengembangan SMA Double Track Tahun ke 5DT-PLUSK Pengembangan SMA Double Track Tahun ke 5
DT-PLUSK Pengembangan SMA Double Track Tahun ke 5
Fajar Baskoro
 
Generasi Terampil Digital Skill-2023.pptx
Generasi Terampil Digital Skill-2023.pptxGenerasi Terampil Digital Skill-2023.pptx
Generasi Terampil Digital Skill-2023.pptx
Fajar Baskoro
 
Cara Membuat Kursus Online Wordpress-tutorstarter
Cara Membuat Kursus Online Wordpress-tutorstarterCara Membuat Kursus Online Wordpress-tutorstarter
Cara Membuat Kursus Online Wordpress-tutorstarter
Fajar Baskoro
 
PPT-Kick Off Double Track 2024 melaksanakan Festival Ramadhan
PPT-Kick Off Double Track 2024 melaksanakan Festival RamadhanPPT-Kick Off Double Track 2024 melaksanakan Festival Ramadhan
PPT-Kick Off Double Track 2024 melaksanakan Festival Ramadhan
Fajar Baskoro
 
Buku Inovasi 2023 - 2024 konsep capaian KUS
Buku Inovasi 2023 - 2024 konsep capaian  KUSBuku Inovasi 2023 - 2024 konsep capaian  KUS
Buku Inovasi 2023 - 2024 konsep capaian KUS
Fajar Baskoro
 
Pemaparan Sosialisasi Program Dual Track 2024.pptx
Pemaparan Sosialisasi Program Dual Track 2024.pptxPemaparan Sosialisasi Program Dual Track 2024.pptx
Pemaparan Sosialisasi Program Dual Track 2024.pptx
Fajar Baskoro
 
Executive Millennial Entrepreneur Award 2023-1a-1.pdf
Executive Millennial Entrepreneur Award  2023-1a-1.pdfExecutive Millennial Entrepreneur Award  2023-1a-1.pdf
Executive Millennial Entrepreneur Award 2023-1a-1.pdf
Fajar Baskoro
 
1-Executive Millennial Entrepreneur Award 2023-1-cetak.pptx
1-Executive Millennial Entrepreneur Award  2023-1-cetak.pptx1-Executive Millennial Entrepreneur Award  2023-1-cetak.pptx
1-Executive Millennial Entrepreneur Award 2023-1-cetak.pptx
Fajar Baskoro
 
Executive Millennial Entrepreneur Award 2023-1.pptx
Executive Millennial Entrepreneur Award  2023-1.pptxExecutive Millennial Entrepreneur Award  2023-1.pptx
Executive Millennial Entrepreneur Award 2023-1.pptx
Fajar Baskoro
 
Pemrograman Mobile - JetPack Compose1.pptx
Pemrograman Mobile - JetPack Compose1.pptxPemrograman Mobile - JetPack Compose1.pptx
Pemrograman Mobile - JetPack Compose1.pptx
Fajar Baskoro
 
Evaluasi KPP Program Dual Track Provinsi Kaltim
Evaluasi KPP Program Dual Track Provinsi KaltimEvaluasi KPP Program Dual Track Provinsi Kaltim
Evaluasi KPP Program Dual Track Provinsi Kaltim
Fajar Baskoro
 
foto tenda digital skill program dari sekolah
foto tenda digital skill program dari sekolahfoto tenda digital skill program dari sekolah
foto tenda digital skill program dari sekolah
Fajar Baskoro
 

More from Fajar Baskoro (20)

Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Pemberdayaan Kelompok Usaha Siswa dengan Tools Wirausaha AI.pdf
Pemberdayaan Kelompok Usaha Siswa dengan Tools Wirausaha AI.pdfPemberdayaan Kelompok Usaha Siswa dengan Tools Wirausaha AI.pdf
Pemberdayaan Kelompok Usaha Siswa dengan Tools Wirausaha AI.pdf
 
Skills for The Future - Pemberdayaan Remaja Untuk Meningkatkan Keterampilan.pptx
Skills for The Future - Pemberdayaan Remaja Untuk Meningkatkan Keterampilan.pptxSkills for The Future - Pemberdayaan Remaja Untuk Meningkatkan Keterampilan.pptx
Skills for The Future - Pemberdayaan Remaja Untuk Meningkatkan Keterampilan.pptx
 
Slides OOSC - Program Penanganan ATS Unicef Bappeda Jawa Timur.pptx
Slides OOSC - Program Penanganan ATS Unicef Bappeda Jawa Timur.pptxSlides OOSC - Program Penanganan ATS Unicef Bappeda Jawa Timur.pptx
Slides OOSC - Program Penanganan ATS Unicef Bappeda Jawa Timur.pptx
 
PPT- Menyiapkan GenerasiTerampilDigitalSkill1.pptx
PPT- Menyiapkan GenerasiTerampilDigitalSkill1.pptxPPT- Menyiapkan GenerasiTerampilDigitalSkill1.pptx
PPT- Menyiapkan GenerasiTerampilDigitalSkill1.pptx
 
PPT-Menyiapkan Alumni GenerasiTerampil.pptx
PPT-Menyiapkan Alumni GenerasiTerampil.pptxPPT-Menyiapkan Alumni GenerasiTerampil.pptx
PPT-Menyiapkan Alumni GenerasiTerampil.pptx
 
RIngkasan Program - Markoding Innovation Challenge.pptx
RIngkasan Program - Markoding Innovation Challenge.pptxRIngkasan Program - Markoding Innovation Challenge.pptx
RIngkasan Program - Markoding Innovation Challenge.pptx
 
Pengembangan Program Pelatihan Double Track - DT PLUSK
Pengembangan Program Pelatihan Double Track - DT PLUSKPengembangan Program Pelatihan Double Track - DT PLUSK
Pengembangan Program Pelatihan Double Track - DT PLUSK
 
DT-PLUSK Pengembangan SMA Double Track Tahun ke 5
DT-PLUSK Pengembangan SMA Double Track Tahun ke 5DT-PLUSK Pengembangan SMA Double Track Tahun ke 5
DT-PLUSK Pengembangan SMA Double Track Tahun ke 5
 
Generasi Terampil Digital Skill-2023.pptx
Generasi Terampil Digital Skill-2023.pptxGenerasi Terampil Digital Skill-2023.pptx
Generasi Terampil Digital Skill-2023.pptx
 
Cara Membuat Kursus Online Wordpress-tutorstarter
Cara Membuat Kursus Online Wordpress-tutorstarterCara Membuat Kursus Online Wordpress-tutorstarter
Cara Membuat Kursus Online Wordpress-tutorstarter
 
PPT-Kick Off Double Track 2024 melaksanakan Festival Ramadhan
PPT-Kick Off Double Track 2024 melaksanakan Festival RamadhanPPT-Kick Off Double Track 2024 melaksanakan Festival Ramadhan
PPT-Kick Off Double Track 2024 melaksanakan Festival Ramadhan
 
Buku Inovasi 2023 - 2024 konsep capaian KUS
Buku Inovasi 2023 - 2024 konsep capaian  KUSBuku Inovasi 2023 - 2024 konsep capaian  KUS
Buku Inovasi 2023 - 2024 konsep capaian KUS
 
Pemaparan Sosialisasi Program Dual Track 2024.pptx
Pemaparan Sosialisasi Program Dual Track 2024.pptxPemaparan Sosialisasi Program Dual Track 2024.pptx
Pemaparan Sosialisasi Program Dual Track 2024.pptx
 
Executive Millennial Entrepreneur Award 2023-1a-1.pdf
Executive Millennial Entrepreneur Award  2023-1a-1.pdfExecutive Millennial Entrepreneur Award  2023-1a-1.pdf
Executive Millennial Entrepreneur Award 2023-1a-1.pdf
 
1-Executive Millennial Entrepreneur Award 2023-1-cetak.pptx
1-Executive Millennial Entrepreneur Award  2023-1-cetak.pptx1-Executive Millennial Entrepreneur Award  2023-1-cetak.pptx
1-Executive Millennial Entrepreneur Award 2023-1-cetak.pptx
 
Executive Millennial Entrepreneur Award 2023-1.pptx
Executive Millennial Entrepreneur Award  2023-1.pptxExecutive Millennial Entrepreneur Award  2023-1.pptx
Executive Millennial Entrepreneur Award 2023-1.pptx
 
Pemrograman Mobile - JetPack Compose1.pptx
Pemrograman Mobile - JetPack Compose1.pptxPemrograman Mobile - JetPack Compose1.pptx
Pemrograman Mobile - JetPack Compose1.pptx
 
Evaluasi KPP Program Dual Track Provinsi Kaltim
Evaluasi KPP Program Dual Track Provinsi KaltimEvaluasi KPP Program Dual Track Provinsi Kaltim
Evaluasi KPP Program Dual Track Provinsi Kaltim
 
foto tenda digital skill program dari sekolah
foto tenda digital skill program dari sekolahfoto tenda digital skill program dari sekolah
foto tenda digital skill program dari sekolah
 

Recently uploaded

Secure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA ComplianceSecure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
ICS
 
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdfTheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
Ortus Solutions, Corp
 
Call Girls in Varanasi || 7426014248 || Quick Booking at Affordable Price
Call Girls in Varanasi || 7426014248 || Quick Booking at Affordable PriceCall Girls in Varanasi || 7426014248 || Quick Booking at Affordable Price
Call Girls in Varanasi || 7426014248 || Quick Booking at Affordable Price
vickythakur209464
 
European Standard S1000D, an Unnecessary Expense to OEM.pptx
European Standard S1000D, an Unnecessary Expense to OEM.pptxEuropean Standard S1000D, an Unnecessary Expense to OEM.pptx
European Standard S1000D, an Unnecessary Expense to OEM.pptx
Digital Teacher
 
Folding Cheat Sheet #5 - fifth in a series
Folding Cheat Sheet #5 - fifth in a seriesFolding Cheat Sheet #5 - fifth in a series
Folding Cheat Sheet #5 - fifth in a series
Philip Schwarz
 
AI Based Testing - A Comprehensive Guide.pdf
AI Based Testing - A Comprehensive Guide.pdfAI Based Testing - A Comprehensive Guide.pdf
AI Based Testing - A Comprehensive Guide.pdf
kalichargn70th171
 
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service AvailableFemale Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
isha sharman06
 
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service AvailableCall Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
sapnaanpad7
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
Alina Yurenko
 
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
Ortus Solutions, Corp
 
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
Shane Coughlan
 
119321250-History-of-Computer-Programming.ppt
119321250-History-of-Computer-Programming.ppt119321250-History-of-Computer-Programming.ppt
119321250-History-of-Computer-Programming.ppt
lavesingh522
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Vince Scalabrino
 
Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)
wonyong hwang
 
Top Call Girls Lucknow ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl Services Pr...
Top Call Girls Lucknow ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl Services Pr...Top Call Girls Lucknow ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl Services Pr...
Top Call Girls Lucknow ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl Services Pr...
simmi singh$A17
 
Trailhead Talks_ Journey of an All-Star Ranger .pptx
Trailhead Talks_ Journey of an All-Star Ranger .pptxTrailhead Talks_ Journey of an All-Star Ranger .pptx
Trailhead Talks_ Journey of an All-Star Ranger .pptx
ImtiazBinMohiuddin
 
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdfThe Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
kalichargn70th171
 
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
Chad Crowell
 
Refactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contextsRefactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contexts
Michał Kurzeja
 

Recently uploaded (20)

Secure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA ComplianceSecure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdfTheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
 
Call Girls in Varanasi || 7426014248 || Quick Booking at Affordable Price
Call Girls in Varanasi || 7426014248 || Quick Booking at Affordable PriceCall Girls in Varanasi || 7426014248 || Quick Booking at Affordable Price
Call Girls in Varanasi || 7426014248 || Quick Booking at Affordable Price
 
European Standard S1000D, an Unnecessary Expense to OEM.pptx
European Standard S1000D, an Unnecessary Expense to OEM.pptxEuropean Standard S1000D, an Unnecessary Expense to OEM.pptx
European Standard S1000D, an Unnecessary Expense to OEM.pptx
 
Folding Cheat Sheet #5 - fifth in a series
Folding Cheat Sheet #5 - fifth in a seriesFolding Cheat Sheet #5 - fifth in a series
Folding Cheat Sheet #5 - fifth in a series
 
AI Based Testing - A Comprehensive Guide.pdf
AI Based Testing - A Comprehensive Guide.pdfAI Based Testing - A Comprehensive Guide.pdf
AI Based Testing - A Comprehensive Guide.pdf
 
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service AvailableFemale Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
 
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service AvailableCall Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
 
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
 
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
 
119321250-History-of-Computer-Programming.ppt
119321250-History-of-Computer-Programming.ppt119321250-History-of-Computer-Programming.ppt
119321250-History-of-Computer-Programming.ppt
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
 
Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)Hyperledger Besu 빨리 따라하기 (Private Networks)
Hyperledger Besu 빨리 따라하기 (Private Networks)
 
bgiolcb
bgiolcbbgiolcb
bgiolcb
 
Top Call Girls Lucknow ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl Services Pr...
Top Call Girls Lucknow ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl Services Pr...Top Call Girls Lucknow ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl Services Pr...
Top Call Girls Lucknow ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl Services Pr...
 
Trailhead Talks_ Journey of an All-Star Ranger .pptx
Trailhead Talks_ Journey of an All-Star Ranger .pptxTrailhead Talks_ Journey of an All-Star Ranger .pptx
Trailhead Talks_ Journey of an All-Star Ranger .pptx
 
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdfThe Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
The Ultimate Guide to Top 36 DevOps Testing Tools for 2024.pdf
 
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
 
Refactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contextsRefactoring legacy systems using events commands and bubble contexts
Refactoring legacy systems using events commands and bubble contexts
 

Ch08-Architecture Design

  • 1. Systems Analysis and DesignSystems Analysis and Design 5th Edition5th Edition Chapter 8. Architecture DesignChapter 8. Architecture Design Alan Dennis, Barbara Haley Wixom, and Roberta Roth 8-1© Copyright 2011 John Wiley & Sons, Inc.
  • 2. Chapter 8 Outline Elements of an architecture design. Creating an architecture design. Hardware and software specification. © Copyright 2011 John Wiley & Sons, Inc. 8-2
  • 3. INTRODUCTION  Architecture design – Plans for how the system will be distributed across multiple computers and what hardware, operating system software, and application software will be used for each computer.  Key factors in architecture design – Nonfunctional requirements developed early in the analysis phase play a key role in architecture design.  Hardware and software specification – Defines what hardware and software are needed for the new system. © Copyright 2011 John Wiley & Sons, Inc. 8-3
  • 4. ELEMENTS OF AN ARCHITECTURE DESIGN  The objective of architecture design is to determine how the software components of the information system will be assigned to the hardware devices of the system. © Copyright 2011 John Wiley & Sons, Inc. 8-4
  • 5. Architectural Components  The major architectural components of any system are the software and the hardware.  All software systems can be divided into four basic functions: - Data storage. - Data access logic: the processing required to access stored data. - Application logic: the logic documented in the DFDs, use cases, and functional requirements. - Presentation logic: the display of information to the user and the acceptance of the user’s commands. © Copyright 2011 John Wiley & Sons, Inc. 8-5
  • 6. (cont’d) The three primary hardware components: - Client computers: Input-output devices employed by users (e.g., PCs, laptops, handheld devices, smart phones) - Servers: Larger multi-user computers used to store software and data. - The network: Connects the computers. © Copyright 2011 John Wiley & Sons, Inc. 8-6
  • 7. Client-Server Architectures © Copyright 2011 John Wiley & Sons, Inc. 8-7 Client-server architectures balance the processing between client devices and one or more server devices. The client is responsible for the presentation logic, whereas the server is responsible for the data access logic and data storage. A thick or fat client contains all or most of application logic; whereas a thin client contains a small portion of the application logic.
  • 8. (cont’d) © Copyright 2011 John Wiley & Sons, Inc. 8-8
  • 9. (cont’d)  Client-server architectures have four important benefits. - Scalable - Can support different types of clients and servers through middleware. - The presentation logic, the application logic, and the data processing logic can be independent. - If a server fails, only the applications requiring that sever are affected.  The major limitation of client-server architectures is their complexity. © Copyright 2011 John Wiley & Sons, Inc. 8-9
  • 10. Client-Server Tiers  There are many ways in which the application logic can be partitioned between the client and the server. The arrangement in Figure 8-1 is called two-tiered architecture. © Copyright 2011 John Wiley & Sons, Inc. 8-10
  • 11. (cont’d) Three-tiered architecture © Copyright 2011 John Wiley & Sons, Inc. 8-11
  • 12. (cont’d) n-tiered architecture © Copyright 2011 John Wiley & Sons, Inc. 8-12
  • 13. Less Common Architectures Server-Based Architectures © Copyright 2011 John Wiley & Sons, Inc. 8-13
  • 14. Client-Based Architectures © Copyright 2011 John Wiley & Sons, Inc. 8-14
  • 15. Advances in Architecture Configurations Advances in hardware, software, and networking have given rise to a number of new architecture options. - Virtualization. - Cloud computing. © Copyright 2011 John Wiley & Sons, Inc. 8-15
  • 16. Virtualization  Virtualization refers to a creation of a virtual device or resource, such as a server or storage device.  Server virtualization involves partitioning a physical server into smaller virtual servers.  Storage virtualization involves combining multiple network storage devices into what appears to be single storage unit. © Copyright 2011 John Wiley & Sons, Inc. 8-16
  • 17. Cloud Computing  Cloud computing – everything from computing power to computing infrastructure, applications, business processes to personal collaboration can be delivered as a service wherever and whenever needed. The “cloud” can be defined as the set of hardware, networks, storages, devices, and interfaces that combine to deliver aspects of computing as a service.© Copyright 2011 John Wiley & Sons, Inc. 8-17
  • 18. (cont’d)  Cloud computing can be implemented in three ways: - private cloud, - public cloud, and - hybrid cloud.  At this time, cloud computing is in its early stage of development. © Copyright 2011 John Wiley & Sons, Inc. 8-18
  • 19. (cont’d)  Advantages of cloud computing 1. The resources allocated can be increased or deceased based on demand. 2. Cloud customers can obtain cloud resources in a straightforward fashion. 3. Cloud services typically have standardized APIs (application program interfaces). 4. The cloud computing model enables customers to be billed for resources as they are used. © Copyright 2011 John Wiley & Sons, Inc. 8-19
  • 20. Comparing Architecture Options Most systems are built to use the existing infrastructure in the organization, so often the current infrastructure restricts the choice of architecture. Each of the architectures discussed has its strengths and weaknesses. Client-server architectures are strongly favored on the basis of the cost of infrastructure. © Copyright 2011 John Wiley & Sons, Inc. 8-20
  • 21. CREATING AN ARCHITECTURE DESIGN  Creating an architecture design begins with the nonfunctional requirements. Refine the nonfunctional requirements into more detailed requirements for the selection of architecture. The nonfunctional requirements and the architecture design are used to develop the hardware and software specification. © Copyright 2011 John Wiley & Sons, Inc. 8-21
  • 22. Operational Requirements © Copyright 2011 John Wiley & Sons, Inc. 8-22
  • 23. Performance Requirements © Copyright 2011 John Wiley & Sons, Inc. 8-23
  • 24. Security Requirements © Copyright 2011 John Wiley & Sons, Inc. 8-24
  • 25. Cultural and Political Requirements © Copyright 2011 John Wiley & Sons, Inc. 8-25
  • 26. Designing the Architecture In many cases, the technical environment requirements as driven by the business requirements define the application architecture. If the technical environment requirements do not require the choice of a specific architecture, then other nonfunctional requirements become important for designing the architecture. © Copyright 2011 John Wiley & Sons, Inc. 8-26
  • 27. (cont’d) © Copyright 2011 John Wiley & Sons, Inc. 8-27 Nonfunctional Requirements and Their Implications for Architecture Design
  • 28. HARDWARE AND SOFTWARE SPECIFICATION The design phase is also the time to begin selecting and acquiring the hardware and software that will be needed for the future system. The hardware and software specification is a document that describes what hardware and software are needed to support the application. © Copyright 2011 John Wiley & Sons, Inc. 8-28
  • 29. (cont’d)  Sample hardware and software specification © Copyright 2011 John Wiley & Sons, Inc. 8-29
  • 30. (cont’d)  First, you define software – Define the operating system and any special purpose software – Consider additional costs such as training, warranty, maintenance, licensing agreements.  Next, you create a list of the hardware needed – Database servers, network servers, peripheral devices, clients, backup devices, storage components, and others.  Finally, you describe the minimum requirements for each piece of hardware. © Copyright 2011 John Wiley & Sons, Inc. 8-30
  • 31. (cont’d) Factors in hardware and software selection © Copyright 2011 John Wiley & Sons, Inc. 8-31
  • 32. SUMMARY Application architecture. - Client-server architecture. - Advances in architecture configurations: virtualization and cloud computing. Architecture Design. - Nonfunctional requirements. Hardware and software specification. - A document that describes what hardware and software are needed to support the application. © Copyright 2011 John Wiley & Sons, Inc. 8-32
  • 33. Copyright 2011 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for redistribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein. © Copyright 2011 John Wiley & Sons, Inc. 8-33
  翻译: