
When describing a system, explain why you may have to start the design of the system architecture before the requirements specification is complete.

Architecture design:
It is the high-level structures of a software system and also the discipline of developing such structures and systems. In this the structure includes the software elements, relations among them, and the properties of both elements and relations. It acts as the blueprint for the system and also the developing project, laying out the tasks that are required to be executed by the design teams.
Explanation of Solution
Importance of describing architecture before writing specifications:
- In a model of software development process, architecture design becomes the first page of the system as it describes how the system is organized as a set of communicating components.
- It is difficult to formulate the specifications written for the whole system as they increase the complexity. It becomes easier to define the specifications when the system is divided into subsystems. It defines the specifications and also put place it inside the respective subsystem.
- With this process of developing subsystems and their respective specifications, we can readily jump into the implementation stage. Few reasons behind the fact that the architecture has to designed before specifications are written, are as follows:
- It provides the structure.
- The subsystems are developed and their specifications can be written concurrently.
- It allows the manufacturing of hardware components by sub-contractors and also provides a model for system costing.
Want to see more full solutions like this?
Chapter 6 Solutions
Software Engineering (10th Edition)
Additional Engineering Textbook Solutions
Problem Solving with C++ (10th Edition)
Modern Database Management
Thinking Like an Engineer: An Active Learning Approach (4th Edition)
Starting Out with C++ from Control Structures to Objects (9th Edition)
Web Development and Design Foundations with HTML5 (8th Edition)
Java: An Introduction to Problem Solving and Programming (8th Edition)
- (Greedy Algorithms) Describe an efficient algorithm that, given a set {x1, x2, . . ., xn} of points on the real line, determines the smallest set of unit-length closed intervals that contains all of the given points. Argue that your algorithm is correct.arrow_forwardWhat does the value of the top variable indicate in this ArrayStack implementation? What will happen if we call pop on this stack? What value will be returned, and what changes will occur in the array and the top variable? 3. If we push the value "echo" onto the stack, where will it be stored in the array, and what will be the new value of top? 4. Explain why index 0 contains the string "alpha" even though top is currently 3. 5. What would the state of the stack look like (values in the array and value of top) after two consecutive pop 0 operations?arrow_forwardPlease solve and show all work. Suppose there are four routers between a source and a destination hosts. Ignoring fragmentation, an IP datagram sent from source to destination will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination?arrow_forward
- Please solve and show all work. When a large datagram is fragmented into multiple smaller datagrams, where are these smaller datagrams reassembled into a single large datagram?arrow_forwardPlease solve and show all steps. True or false? Consider congestion control in TCP. When the timer expires at the sender, the value of ssthresh is set to one-half of the last congestion window.arrow_forwardPlease solve and show all work. What are the purposes of the SNMP GetRequest and SetRequest messages?arrow_forward
- Please solve and show all steps. Three types of switching fabrics are discussed in our course. List and briefly describe each type. Which, if any, can send multiple packets across the fabric in parallel?arrow_forwardPlease solve and show steps. List the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service.arrow_forwardPlease solve and show all work. What is the advantage of web caches, and how does it work?arrow_forward
- Please solve and show steps. Consider a DASH system for which there are N video versions (at N different rates and qualities) and N audio versions (at N different rates and qualities). Suppose we want to allow the player to choose at any time any of the N video versions and any of the N audio versions. If we create files so that the audio is mixed in with its matched-rate video and the server sends only one media stream at a given time, how many files will the server need to store (each with a different URL)? If the server instead sends the audio and video streams separately and has the client synchronize the streams, how many files will the server need to store?arrow_forwardPlease solve and show all work. Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate at the transport layer or the application layer?arrow_forwardPlease solve and show all work. Compute the checksum of the words 1011 1001, 1001 1110, and 0111 1011. Show all work.arrow_forward
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems Analysis and Design (Shelly Cashman Serie...Computer ScienceISBN:9781305494602Author:Scott Tilley, Harry J. RosenblattPublisher:Cengage Learning




