![]() |
![]() |
![]() |
|
![]() |
|||
| 8.2.2 System Architecture (SysArc) |
Contents
|
|
|---|
Introduction
The product System Architecture includes possible solution proposals, results from feasibility studies, the IT security concept, the IT security model, and the allocation between User Requirements and the elements of the System Architecture.
Document Index
Document Structure
Those parts of the System that are to be realized with off-the-shelf products or in which off-the-shelf products are to be used have to be specified.
During the System Architecture design it is necessary to observe that, normally, the technical structure of an IT system and the organization at the user have an impact on each other. The user organization has an important impact on solution approaches, and has to be consulted, on the one hand, with regard to considerations about the System Architecture. In IT systems with a client-server architecture, on the other hand, capacities for technical system and user support may have to be planned at the actual site, in the user organization. These considerations should also include the distribution of new system versions and variants during system utilization, and should be regulated in an organizational manner. In this connection, both technical and economical aspects have to be taken into consideration.
The table includes
In object-oriented development, the following must be observed: The functional User Requirements are described by means of "use cases". These User Requirements are finally realized in class hierarchies and the corresponding cooperation. In object-oriented development, the allocation of the User Requirements can therefore be realized by an allocation of "use cases" to class (hierarchy) groups, whereby these requirements will be met by the cooperation of these "use cases" and class groups.
In addition, the inter-computer process communication that is to be refined within the scope of the Software Architecture at some later time must also be described here, if necessary.
Examples: Technical operation of the users' communication via a client-server network on the basis of a Novell network; technical solution for the access of selected users to the Internet; technical support of the signature tracing via e-mail.
Solution outlines for the structure of the System or system parts describe the architecture idea and the decomposition of the System or system part. The User Requirements are in every case the basis for the system outlines.
When generating solution proposals, the possible use of off-the-shelf products must be taken into consideration.
The results of the market analysis with regard to the availability of appropriate Off-the-shelf-products have to be documented.
The following aspects may be considered within the scope of the feasibility study:
The tasks of the measures and the responsibility during realization must be documented. The efficiency of the overall measures, their compatibility with regulations and rules, the cost/benefit ratio and the residual risk have to be justified.
Product Flow
| Chapter | Activity | From | to | Methods | Tool Req. | Ext. Norms | |||
|---|---|---|---|---|---|---|---|---|---|
| No. | Title | Activity | State | Activity | State | ||||
| 2.1.1 | Technical System Structure | SD2.1 | - | - | SD2.2 SD2.3 SD2.4 |
being proc. |
COM CRC PRODIAG SSM |
SSD22 SSD23 SSD25 | |
| 2.1.2 | Identification of Interfaces | SD2.1 | - | - | SD2.2 SD2.3 SD2.4 |
being proc. | |||
| 2.1.3 | Requirements Allocation | SD2.4 | - | - | SD1 SD2.5 SD2.6 SD3 SD4-SW PM4 PM5 |
submitted | ER |
SSD01 SSD09 |
|
| 2.2 | Explanation of the Cooperation of Technical Elements | SD2.1 | - | - | SD2.2 SD2.3 SD2.4 |
being proc. | IAM | SSD28 | |
| 3.1 | Solution Proposals | SD2.1 | - | - | SD2.2 SD2.3 SD2.4 |
being proc. |
COM CRC FCTD SSM |
SSD22 SSD23 |
|
| 3.2 | Feasibility Studies | SD2.3 | - | - | SD2.1 PM5 |
being proc. |
BA SIMU |
SSD18 SSD19 |
|
| 4 | IT Security Concept | SD2.1 | - | - | SD2.2 SD2.3 SD2.4 |
being proc. | |||
| 4 | IT Security Concept | SD2.2 | - | - | SD2.1 | being proc. | |||
| 5 | IT Security Model | SD2.1 | - | - | SD2.2 SD2.3 SD2.4 |
being proc. | |||
| Existing | SD2.1 | SD2.2 | being proc. | - | - | ||||
| Existing | SD2.1 | SD2.3 | being proc. | - | - | ||||
| Existing | SD2.1 | SD2.4 | being proc. | - | - | ||||
Links to the V-Model Mailinglist
![]() |
![]() |
This page online GDPA Online Last Updated 06.Mar.2003 by C. Freericks |