They can be used to plan the architecture of a system. They model physical hardware elements and the communication paths between them.They capture the hardware that will be used to implement the system and the links between different items of hardware.They show the structure of the run-time system.How secure does the system needs to be (needs a firewall, physically secure hardware, etc.)?.How will you monitor the system once deployed?.What hardware and software will users directly interact with (PCs, network computers, browsers, etc.)?.What middleware, including the operating system and communications approaches and protocols, will system use?.What and who will connect to or interact with system, and how will they do it.How robust does system need to be (e.g., redundant hardware in case of a system failure)?.What existing systems will the newly added system need to interact or integrate with?.
0 Comments
Leave a Reply. |