DefCon is an organization that develops IT solutions for businesses. The product in consideration is a system for supporting a magazine subscription business, where information about customers and their subscribed products is collected, stored, and tracked. Currently, online subscriptions are not possible, so the details of subscriptions are mailed to the business and entered into the system manually. This business has around 45 employees with offices in Canberra, Sydney, and Perth. The employees have an option to work from home, so the system supports remote access. The basic architecture of the system is presented below: 1. Briefly describe the steps in the Attribute Driven Design (ADD) Process

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Case Study:

DefCon is an organization that develops IT solutions for businesses. The product in consideration is a system for supporting a magazine subscription business, where information about customers and their subscribed products is collected, stored, and tracked. Currently, online subscriptions are not possible, so the details of subscriptions are mailed to the business and entered into the system manually. This business has around 45 employees with offices in Canberra, Sydney, and Perth. The employees have an option to work from home, so the system supports remote access.

The basic architecture of the system is presented below:

1. Briefly describe the steps in the Attribute Driven Design (ADD) Process

2. Considering the following quality attributes as important to this system, follow two iterations of the ADD process. For each iteration, provide the selected ASR, chosen tactic, and justification for it

Availability – The system should be available for access during normal operational hours 99.999% of the time. In case of failure, it should recover within 2 seconds.

Performance - The system handles a large amount of data as there are 90 thousand customers with more than a million orders. The system should handle this load with a latency of 1 second.

Security – The system should resist any unauthorized access anytime with 99.999% accuracy.

Performance - The system should respond to user requests with an average latency of 1 second.

3. Submit the resulting architecture with clearly defined modifications in the basic architecture provided (The added components should be clearly labeled). You can use a pen/pencil to draw the diagram or you can draw it using MS Visio or any other software or tool

Clients - Custom
Views
Workstations
Controller
Business rule
processing
Multiple layers
Database access
layer
Order and
customer
database (Model)
Transcribed Image Text:Clients - Custom Views Workstations Controller Business rule processing Multiple layers Database access layer Order and customer database (Model)
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY