SlideShare a Scribd company logo
Chapter 10
Architectural Design
Software Engineering: A Practitioner’s Approach, 6th edition
by Roger S. Pressman

1
Software Architecture
 The software architecture of a program or
computing system is the structure or
structures of the system, which comprise the
software components, the externally visible
properties of those components, and the
relationships among them.
— Bass. et al.
2
Why Architecture?


Architecture is a representation of a system
that enables the software engineer to:
1. analyze the effectiveness of the design in
meeting its stated requirements,
2. consider architectural alternatives at a stage
when making design changes is still relatively
easy, and
3. reduce the risks associated with the construction
of the software.
3
Data Design
 Architectural level → Database design
 data mining
 data warehousing

 Component level → Data structure
design
4
What principles are applicable to data design?

1. The systematic analysis principles applied to function
and behavior should also be applied to data.
2. All data structures and the operations to be
performed on each should be identified.
3. A mechanism for defining the content of each data
object should be established and used to define both
data and the operations applied to it.
4. Low-level data design decisions should be deferred
until late in the design process.
5
What principles are applicable to data design

5. The representation of a data structure should be
known only to those modules that must make direct
use of the data contained within the structure.
6. A library of useful data structures and the operations
that may be applied to them should be developed.
7. A software design and programming language should
support the specification and realization of abstract
data types.

6
Architectural Styles


Each style describes a system category that
encompasses:
1. a set of components (e.g., a database, computational
modules) that perform a function required by a system,
2. a set of connectors that enable “communication,
coordination, and cooperation” among components,
3. constraints that define how components can be integrated
to form the system, and
4. semantic models that enable a designer to understand the
overall properties of a system.
7
Specific Styles






Data-centered architecture
Data flow architecture
Call and return architecture
Object-oriented architecture
Layered architecture
8
Data-Centered Architecture

9
Data-Centered Architecture
 Data store resides at the center of this architecture and is accessed
frequently by other components that update, add, delete or otherwise
modify data within the store.
 Client software accesses a central repository.
 Some cases, the data repository is passive, that is client software
accesses the data independent of any changes to the data or the
actions of other client software.
 A variation on this approach transforms the repository into a
blackboard that sends notifications to client software when data of
interest to the client changes.
 A data-centered architecture promotes integrability. That is, existing
components can be changed and new client components added to the
architecture without concern about other clients.
10
 Client components independently execute processes.
Data-Flow Architecture

11
Data-Flow Architecture
This architecture is applied when input data are to be
transformed through a series of computational or manipulative
components into output data.
A pipe and filter structure has a set of components, called
filters, connected by pipes that transmit data from one
component to the next.
Each filter works independently of those components upstream
and downstream, is designed to expect data input of a certain
form, and produces data output of a specified form.
Filter does not require knowledge of the workings of its
neighboring filters.
12
Call and Return Architecture

13
Call and Return Architecture
This architecture style enables a software designer to achieve a
program structure that is relatively easy to modify and scale.
Two sub styles exist within this category:
1. Main program / sub program architecture: This classic program
structure decompose3s function into a control hierarchy where a
main program invokes a number of program components, which
in turn may invoke still other components.
2. Remote Procedure Call architecture: The components of a main
program / sub program architecture are distributed across
multiple computers on a network.
14
Object-Oriented Architecture

15
Object-Oriented Architecture
The components of a system encapsulate data and the
operations that must be applied to manipulate the data.
Communication and coordination between components is
accomplished via message passing.

16
Layered Architecture

17
Layered Architecture
A number of different layers are defined, each accomplishing
operations that progressively become closer to the machine
instruction set.
At the outer layer, components service user interface operations.
At the inner layer, components perform operating system
interfacing.
At the intermediate layers provide utility services and
application software functions.

18
Architectural Patterns Domains
 Concurrency
 operating system process management
 task scheduler

 Persistence
 database management system
 application level persistence

 Distribution
 broker
19
Architectural Design
 Architectural context diagrams model how
software interacts with external entities
 Archetypes are classes or patterns that
represent an abstraction critical to the system
 Architectural components are derived from
the application domain, the infrastructure, and
the interface.
20
Arch. Context Diagram

21
How do system interoperate with one
another?
 System that interoperate with the target system are
represented as:
 Superordinate systems –those system that use the
target system as part of some higher level processing
system.
 Subordinate system- those systems that are used by
the target system and provide data or processing that
are necessary to complete target system
functionality.
22
How do system interoperate with one
another?
Cont…
 Peer-level systems– those system that interact on a
peer-to-peer basis that is information is either
produced or consumed by the peers and the target
system.
 Actors- those entities (people, device) that interact
with the target system by producing or consuming
information that is necessary for requisite processing.
 Each of these external entities communicates with
the target system through an interface(small shaded
rectangles)
23
SafeHome ACD

24
Defining Archetypes
 An archetype is a class or pattern that represents a
core abstraction that is critical to the design of an
architecture for the target system.
 In general, a relatively small set of archetypes is
required to design even relatively complex systems.
 Eg Safe Home Security Function, following
archetypes can be defined:
 Node: represents a cohesive collection of input and
output elements of the home security function.eg. It
might be comprised of (1)various sensors (2) variety
of alarm indicators.
25
Defining Archetypes

cont…

 Detector: An abstraction that encompasses all
sensing equipment that feeds information into the
target system.
 Indicator: An abstraction that represents all
mechanisms(eg alarm, flashing lights, bell) for
indicating that an alarm condition is occurring.
 Controller: an abstraction that depicts the mechanism
that allows the arming or disarming of a node. If
controllers reside on a network, they have the ability
to communicate with one another.
26
SafeHome Archetype

27
Component Structure

28
Component Elaboration

29

More Related Content

PPT
Design
PPTX
Implementation issues software engineering
PPT
DOCX
Designing and documenting software architecture unit 5
PPT
Architectural Design
PPTX
Software engineering 17 architectural design
PPTX
Architectural design of software
PDF
Architectural Design Report G4
Design
Implementation issues software engineering
Designing and documenting software architecture unit 5
Architectural Design
Software engineering 17 architectural design
Architectural design of software
Architectural Design Report G4

What's hot (20)

PDF
Lecture 6 se
PDF
Unit 5- Architectural Design in software engineering
PPT
Ch12
PPT
Se ii unit2-software_design_principles
PDF
Se lec5
PPTX
Fundamental design concepts
PPT
PPTX
Architectural styles and patterns
PPT
System models in distributed system
PDF
Architectural Design
PPTX
Architectural styles and patterns
PPT
Software architecture
PDF
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
PPTX
Context model
PPTX
Design techniques
PPTX
Design Concept software engineering
PPT
System Models in Software Engineering SE7
PPTX
8 system models (1)
PPTX
Ch6-Software Engineering 9
Lecture 6 se
Unit 5- Architectural Design in software engineering
Ch12
Se ii unit2-software_design_principles
Se lec5
Fundamental design concepts
Architectural styles and patterns
System models in distributed system
Architectural Design
Architectural styles and patterns
Software architecture
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Context model
Design techniques
Design Concept software engineering
System Models in Software Engineering SE7
8 system models (1)
Ch6-Software Engineering 9
Ad

Viewers also liked (17)

PPTX
PPT
Software engg. pressman_ch-7-complete
PPT
Software engg. pressman_ch-6 & 7
PPTX
PDF
Journey Certificate
PPT
Software engg. pressman_ch-12
PPT
Software engg. pressman_ch-8
PPT
Software engg. pressman_ch-21
PPTX
Взлом вормикс через чарлез
DOCX
Sakinah.AlAhmed_Resume
PPTX
Alpha strauss - The FoodTech Community
PDF
Coursera fin4devmooc 2015 - Copy
PPT
Software engg. pressman_ch-9
PPTX
Pengenalan huruf
PDF
2.GHLR.GuatemalaAssessment.SlideEdition1
ODP
Big Data analytics with Nginx, Logstash, Redis, Google Bigquery and Neo4j, ja...
DOCX
Ethics of Sweatshops: Managing Global Labour Standards in the Sporting Goods ...
Software engg. pressman_ch-7-complete
Software engg. pressman_ch-6 & 7
Journey Certificate
Software engg. pressman_ch-12
Software engg. pressman_ch-8
Software engg. pressman_ch-21
Взлом вормикс через чарлез
Sakinah.AlAhmed_Resume
Alpha strauss - The FoodTech Community
Coursera fin4devmooc 2015 - Copy
Software engg. pressman_ch-9
Pengenalan huruf
2.GHLR.GuatemalaAssessment.SlideEdition1
Big Data analytics with Nginx, Logstash, Redis, Google Bigquery and Neo4j, ja...
Ethics of Sweatshops: Managing Global Labour Standards in the Sporting Goods ...
Ad

Similar to Software engg. pressman_ch-10 (20)

PPT
Architectural design
PPT
Artifical selection for enhancment for people Use
DOC
Unit-3.doc
PPT
Se ii unit3-architectural-design
PPT
Architec design introduction
PPT
Chapter 3_Software Design sunorganisedASE_BW_finalised.ppt
PPTX
Unit_4_Software_Design.pptx
PPTX
unit 5 Architectural design
PPT
architectural design
PPT
architectural.ppt
PPT
Software architecture design ppt
PPT
Slides chapter 10
PPT
Architecture design in software engineering
PPT
PPTX
Diksha sda presentation
PPT
Software Architecture.ppt
PPTX
ARCHITECTURAL STYLE.pptx
DOC
Architectural design
Artifical selection for enhancment for people Use
Unit-3.doc
Se ii unit3-architectural-design
Architec design introduction
Chapter 3_Software Design sunorganisedASE_BW_finalised.ppt
Unit_4_Software_Design.pptx
unit 5 Architectural design
architectural design
architectural.ppt
Software architecture design ppt
Slides chapter 10
Architecture design in software engineering
Diksha sda presentation
Software Architecture.ppt
ARCHITECTURAL STYLE.pptx

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Big Data Technologies - Introduction.pptx
PPT
Teaching material agriculture food technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
sap open course for s4hana steps from ECC to s4
Big Data Technologies - Introduction.pptx
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectroscopy.pptx food analysis technology
Encapsulation_ Review paper, used for researhc scholars
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?

Software engg. pressman_ch-10

  • 1. Chapter 10 Architectural Design Software Engineering: A Practitioner’s Approach, 6th edition by Roger S. Pressman 1
  • 2. Software Architecture  The software architecture of a program or computing system is the structure or structures of the system, which comprise the software components, the externally visible properties of those components, and the relationships among them. — Bass. et al. 2
  • 3. Why Architecture?  Architecture is a representation of a system that enables the software engineer to: 1. analyze the effectiveness of the design in meeting its stated requirements, 2. consider architectural alternatives at a stage when making design changes is still relatively easy, and 3. reduce the risks associated with the construction of the software. 3
  • 4. Data Design  Architectural level → Database design  data mining  data warehousing  Component level → Data structure design 4
  • 5. What principles are applicable to data design? 1. The systematic analysis principles applied to function and behavior should also be applied to data. 2. All data structures and the operations to be performed on each should be identified. 3. A mechanism for defining the content of each data object should be established and used to define both data and the operations applied to it. 4. Low-level data design decisions should be deferred until late in the design process. 5
  • 6. What principles are applicable to data design 5. The representation of a data structure should be known only to those modules that must make direct use of the data contained within the structure. 6. A library of useful data structures and the operations that may be applied to them should be developed. 7. A software design and programming language should support the specification and realization of abstract data types. 6
  • 7. Architectural Styles  Each style describes a system category that encompasses: 1. a set of components (e.g., a database, computational modules) that perform a function required by a system, 2. a set of connectors that enable “communication, coordination, and cooperation” among components, 3. constraints that define how components can be integrated to form the system, and 4. semantic models that enable a designer to understand the overall properties of a system. 7
  • 8. Specific Styles      Data-centered architecture Data flow architecture Call and return architecture Object-oriented architecture Layered architecture 8
  • 10. Data-Centered Architecture  Data store resides at the center of this architecture and is accessed frequently by other components that update, add, delete or otherwise modify data within the store.  Client software accesses a central repository.  Some cases, the data repository is passive, that is client software accesses the data independent of any changes to the data or the actions of other client software.  A variation on this approach transforms the repository into a blackboard that sends notifications to client software when data of interest to the client changes.  A data-centered architecture promotes integrability. That is, existing components can be changed and new client components added to the architecture without concern about other clients. 10  Client components independently execute processes.
  • 12. Data-Flow Architecture This architecture is applied when input data are to be transformed through a series of computational or manipulative components into output data. A pipe and filter structure has a set of components, called filters, connected by pipes that transmit data from one component to the next. Each filter works independently of those components upstream and downstream, is designed to expect data input of a certain form, and produces data output of a specified form. Filter does not require knowledge of the workings of its neighboring filters. 12
  • 13. Call and Return Architecture 13
  • 14. Call and Return Architecture This architecture style enables a software designer to achieve a program structure that is relatively easy to modify and scale. Two sub styles exist within this category: 1. Main program / sub program architecture: This classic program structure decompose3s function into a control hierarchy where a main program invokes a number of program components, which in turn may invoke still other components. 2. Remote Procedure Call architecture: The components of a main program / sub program architecture are distributed across multiple computers on a network. 14
  • 16. Object-Oriented Architecture The components of a system encapsulate data and the operations that must be applied to manipulate the data. Communication and coordination between components is accomplished via message passing. 16
  • 18. Layered Architecture A number of different layers are defined, each accomplishing operations that progressively become closer to the machine instruction set. At the outer layer, components service user interface operations. At the inner layer, components perform operating system interfacing. At the intermediate layers provide utility services and application software functions. 18
  • 19. Architectural Patterns Domains  Concurrency  operating system process management  task scheduler  Persistence  database management system  application level persistence  Distribution  broker 19
  • 20. Architectural Design  Architectural context diagrams model how software interacts with external entities  Archetypes are classes or patterns that represent an abstraction critical to the system  Architectural components are derived from the application domain, the infrastructure, and the interface. 20
  • 22. How do system interoperate with one another?  System that interoperate with the target system are represented as:  Superordinate systems –those system that use the target system as part of some higher level processing system.  Subordinate system- those systems that are used by the target system and provide data or processing that are necessary to complete target system functionality. 22
  • 23. How do system interoperate with one another? Cont…  Peer-level systems– those system that interact on a peer-to-peer basis that is information is either produced or consumed by the peers and the target system.  Actors- those entities (people, device) that interact with the target system by producing or consuming information that is necessary for requisite processing.  Each of these external entities communicates with the target system through an interface(small shaded rectangles) 23
  • 25. Defining Archetypes  An archetype is a class or pattern that represents a core abstraction that is critical to the design of an architecture for the target system.  In general, a relatively small set of archetypes is required to design even relatively complex systems.  Eg Safe Home Security Function, following archetypes can be defined:  Node: represents a cohesive collection of input and output elements of the home security function.eg. It might be comprised of (1)various sensors (2) variety of alarm indicators. 25
  • 26. Defining Archetypes cont…  Detector: An abstraction that encompasses all sensing equipment that feeds information into the target system.  Indicator: An abstraction that represents all mechanisms(eg alarm, flashing lights, bell) for indicating that an alarm condition is occurring.  Controller: an abstraction that depicts the mechanism that allows the arming or disarming of a node. If controllers reside on a network, they have the ability to communicate with one another. 26