slide 1 chapter 10 system architecture design chapter 10 alan dennis, barbara wixom, and david...
TRANSCRIPT
![Page 1: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/1.jpg)
Slide 1
System Architecture Design
Chapter 10Chapter 10
Alan Dennis, Barbara Wixom, and David Tegarden
John Wiley & Sons, Inc.
Slides by Fred NiedermanEdited by Solomon Negash
![Page 2: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/2.jpg)
Slide 2
Key Definitions
The system architecture design consists of plans for the hardware, software, communications, security , and global support for the new applicationThe designers must decide if processing will occur in the server (server-based), at the personal computer (client-based), or in some combination of these (client-server based).
![Page 3: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/3.jpg)
Slide 3
Key Definitions
The network model shows major components of the system, where they are located and how they will be connected to one another.The hardware and software specifications describe these components in detail and aid those responsible for purchase and acquisition of these products.
![Page 4: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/4.jpg)
Slide 4
COMPUTING ARCHITECTURES
![Page 5: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/5.jpg)
Slide 5
Functions of the Application System
Data storageData access logicApplication logicPresentation logic
![Page 6: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/6.jpg)
Slide 6
Architectures
Server basedClient basedClient-server based
![Page 7: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/7.jpg)
Slide 7
Alternative Servers
In server based architectures, the servers do the work and present the resultsMainframeMinicomputerMicrocomputer (personal computer)
![Page 8: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/8.jpg)
Slide 8
Server-Based Computing
![Page 9: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/9.jpg)
Slide 9
Alternative Clients
In client based architectures, clients do most of the work (except data storage) and present the resultsTerminalsMicrocomputer (personal computer)Special purpose terminals (ATMs, kiosks, Palm Pilots, and many others)
![Page 10: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/10.jpg)
Slide 10
Client-Based Computing
![Page 11: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/11.jpg)
Slide 11
Client-Server-Based Computing (2 Tiers)
![Page 12: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/12.jpg)
Slide 12
Client-Server Attributes
Typical ProsCompatible with web-based system designScaleableWork with multiple vendors/productsNo central point of failure
Typical Cons/Limits
ComplexityNew programming languages and techniques (stress for personnel)More complex to update
![Page 13: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/13.jpg)
Slide 13
Client-Server -- Three Tiers
![Page 14: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/14.jpg)
Slide 14
Client-Server -- Four Tiers
![Page 15: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/15.jpg)
Slide 15
N-Tiered Client-Server Attributes
Typical ProsSeparates processing to better balance loadMore scaleable
Typical Cons/Limits
Greater load on the networkMore difficult to program and test
![Page 16: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/16.jpg)
Slide 16
Distributed Objects Computing
Middleware between clients and serversUpdate middleware when changing client codeMay reduce efficiency of the applicationCORBADCOM
![Page 17: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/17.jpg)
Slide 17
Realities of Infrastructure Design
Most often the infrastructure will be in placeCoordination of infrastructure components is very complexThe application developer will need to coordinate with infrastructure specialists
![Page 18: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/18.jpg)
Slide 18
Selecting a Computing Architecture
Server-Based Client-based Client-server
Cost of infrastructure Very high Medium Low
Cost of development Medium Low High
Ease of development Low High Low-medium
Interface capabilities Low High High
Control and security High Low Medium
Scalability Low Medium High
![Page 19: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/19.jpg)
Slide 19
Your Turn
Consider the course registration system at your university:What computing architecture does it use?What computing architecture would you use if you were replacing it today?
![Page 20: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/20.jpg)
Slide 20
INFRASTUCTURE DESIGN
![Page 21: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/21.jpg)
Slide 21
The Network Model
No standard formatConveys complexity of the system and how components fit togetherComponents are
ClientsEquipmentConnection to external systems or networks
![Page 22: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/22.jpg)
Slide 22
Top-Level Network Model
![Page 23: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/23.jpg)
Slide 23
Hardware and Software Specification
Used if new hardware or software must be purchasedActual acquisition of hardware and software usually left to a purchasing department -- especially in larger firms
![Page 24: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/24.jpg)
Slide 24
Steps in Hardware and Software Specification
Note hardware in low-level network model to create list of needed hardwareDescribe equipment in as much detail as possibleConsider whether increased processing and traffic will absorb unused hardware capacityNote all software running on each hardware component
![Page 25: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/25.jpg)
Slide 25
GLOBAL ISSUES
![Page 26: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/26.jpg)
Slide 26
Global Requirements
Multilingual requirementsConcurrent multilingual systemsDiscrete multilingual systems
Local versus centralized controlUnstated norms (e.g. dates, currency)24-7 SupportCommunications infrastructure
![Page 27: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/27.jpg)
Slide 27
SECURITY
![Page 28: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/28.jpg)
Slide 28
Identifying Threats to the System
A threat is any potential adverse occurrence that can do harm to the application or its dataThreats come from internal as well as external sourcesCategories of threats
Disruptions, destruction and disasterUnauthorized access
![Page 29: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/29.jpg)
Slide 29
Most Common Threats
![Page 30: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/30.jpg)
Slide 30
Assessing the Risk of Each Threat
![Page 31: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/31.jpg)
Slide 31
Creating Controls
A control is something that mitigates or stops a threatControls include
redundancyfault tolerant serversdisaster recovery plansanti-virus software
![Page 32: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/32.jpg)
Slide 32
Additional Controls Include
A security policyPasswords and encryptionFirewalls
![Page 33: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/33.jpg)
What sort of computer architecture would you recommend for your project?Explain your preference.
![Page 34: Slide 1 Chapter 10 System Architecture Design Chapter 10 Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc. Slides by Fred Niederman](https://reader034.vdocument.in/reader034/viewer/2022051316/56649f4e5503460f94c70030/html5/thumbnails/34.jpg)
Slide 34
SummaryThe three fundamental computing architectures are server-based, client-based, and client-server based.The network model shows technical components of the system and their geographic location throughout the organization.Hardware and software must be specified for acquisition in the projectThe systems analyst needs to also account for global issues and security measures.