Uploaded by Yousef Noyer

QuestionsChapter7Ans

advertisement
Questions on Chapter 7
1- Draw a diagram that shows the activities which performed during the system design
phase.
23- Explain with an example the UML deployment diagram.
UML deployment diagrams are used to depict the relationship among run-time components
and nodes, Components are self-contained entities that provide services to other components
or actors. A Web server, for example, is a component that provides services to Web
browsers. A Web browser such as Safari is a component that provides services to a user. A
node is a physical device or an execution environment in which components are executed.
4- Why hardware mapping activity is performed early in the system design?
Because the hardware mapping activity has significant impact on the performance and
complexity of the system.
5- What are the issues introduced by allocating subsystems to hardware nodes?
issues are storing, transferring, replicating, and synchronizing data among subsystems
6- Explain the three options for storage management.
Flat files. Files are the storage abstractions provided by operating systems. The
application stores its data as a sequence of bytes and defines how and when data should
be retrieved
Relational database. A relational database provides data abstraction at a higher level than
flat files. Data are stored in tables that comply with a predefined type called a schema.
Each column in the table represents an attribute. Each row represents a data item as a
tuple of attribute values
Object-oriented database. An object-oriented database provides services similar to a
relational database. Unlike a relational database, it stores data as objects and associations.
7- When should you choose an object-oriented database for storage management?
• Extensive use of associations to retrieve data
• Medium-sized data set
• Irregular associations among objects
8- Explain the three approaches that can be used for representing the access matrix.
A global access table represents explicitly every cell in the matrix as a (actor,class,
operation) tuple. Determining if an actor has access to a specific object requires looking
up the corresponding tuple. If no such tuple is found, access is denied.
An access control list associates a list of (actor,operation) pairs with each class to be
accessed. Empty cells are discarded. Every time an object is accessed, its access list is
checked for the corresponding actor and operation.
A capability associates a (class,operation) pair with an actor. A capability allows an actor
access to an object of the class described in the capability. Denying a capability is
equivalent to denying access.
9- Which method we should use when the number of protected objects is too large and why
it is suitable in this situation?
rules can be used as a compact representation of the global access matrix, a rule-based
representation is more compact than either access control lists or capabilities. Moreover,
a small set of rules is more readable, and hence, more easily proofed by a human reader,
which is a critical aspect when setting up a secure environment
10- What is the difference between static and dynamic access control?
static access control: means that access rights can be modeled as attributes of the objects
of the system.
Dynamic access control: consider a broker actor who is assigned a set of portfolios. By
policy, a broker cannot access portfolios managed by another broker.
11- Give three mechanisms for verifying the association between the identity of the user the
system. (authentication)
is for the user to specify a user name, known by everybody, and a corresponding
password, only known to the system and stored in an access control list.
we can use a biometric sensor for analyzing patterns of blood vessels in a person’s
fingers or eyes.
*****msh la2ya eltaltaa :’(
12- How to prevent an intruder from snooping the network traffic?
Encryption is used to prevent such unauthorized access, Only the receiver has sufficient
knowledge to correctly decrypt the message, that is, to reverse the original process.
13- What are the three possible control flow mechanisms?
Procedure-driven control. Operations wait for input whenever they need data from an
actor.
Event-driven control. A main loop waits for an external event. Whenever an event
becomes available, it is dispatched to the appropriate object, based on information
associated with the event.
Threads. Threads are the concurrent variation of procedure-driven control: The system
can create an arbitrary number of threads, each responding to a different event. If a thread
needs additional data, it waits for input from a specific actor.
14- What are the boundary conditions of a system?
how the system is started, initialized, and shut down—and we need to define how we deal
with major failures such as data corruption and network outages, whether they are caused
by a software error or a power outage.
15- Explain the three sources of exceptions in a system.
• A hardware failure. Hardware ages and fails. A hard disk crash can lead to the
permanent loss of data. The failure of a network link, for example, can momentarily
disconnect two nodes of the system.
• Changes in the operating environment. The environment also affects the way a system
works. A wireless mobile system can loose connectivity if it is out of range of a
transmitter. A power outage can bring down the system, unless it is fitted with back-up
batteries.
• A software fault. An error can occur because the system or one of its components
contains a design error. Although writing bug-free software is difficult, individual
subsystems can anticipate errors from other subsystems and protect against them.
16- Give example questions that can be asked to ensure that the system design model is
correct, realistic, and readable.
Correct : Can every use case be mapped to a set of subsystems?
Realistic : Have concurrency issues (e.g., contention, deadlocks) been addressed?
Readable : Are all entities described at the same level of detail?
17- Describe the role of the architect and the architecture liaisons during the system design.
The architect takes the main role in system design. The architect ensures consistency in
design decisions and interface styles. The architect ensures the consistency of the design
in the configuration management and testing teams, in particular in the formulation of the
configuration management policy and the system integration strategy.
During system design, they focus on the subsystem services; during the implementation
phase, they focus on the consistency of the APIs
18- Why the communication between participants is difficult during the design of large
systems?
Size. The number of issues to be dealt with increases as developers start designing.
Change. The subsystem decomposition and the interfaces of the subsystems are in
constant flux.
Level of abstraction. Discussions about requirements can be made concrete by using
interface mock-ups and analogies with existing systems.
Reluctance to confront problems.
Conflicting goals and criteria. Individual developers often optimize different criteria.
19- Explain the three types of iterations which performed during the system design.
The first set of iterations is best handled in brainstorming sessions (either face-to-face or
electronic). developers do not have yet a grasp of the whole system, and communication
should be maximized at the expense of formality or procedure, Decomposing the system
early allows the responsibility of different subsystems to be assigned to different teams
The second set of iterations aims at solving difficult and focused issues, such as the
choice of a specific vendor or technology, most of these explorations aim at identifying
whether a specific package is appropriate for the system, This enables control flow issues
to be discovered and addressed early.
The third set of iterations remedies design problems discovered late in the process. they
tend to be costly and introduce many new bugs in the system, they should anticipate
changes late in development.
Download