Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

System Architecture Sample exam 2

System Architecture Sample exam 2
Question 1. (8 + 8 + 4 + 4 = 24 Marks)
The following questions relate to requirements:
Figure 1 – Architecture Work Product Dependencies
1) Choose 2 of the key Non-Functional Requirements ? System Qualities. Briefly describe each of your chosen System Qualities, and what are typical metrics associated with each one. Give an example of a well-defined requirement matching your description. (4 marks for each requirement. You should use the first table provided in the following page to record your answer).
2) Briefly compare and contrast Use Case Model versus Process Model (Figure 1). Point out at least 2 differences and 2 similarities. Offer your opinion if both models should be produced during the design phase of the project or just one of these models would generally suffice. Provide the rational for your opinion. (1 mark for each similarity, 1 mark for each difference and 4 marks for discussion on one versus both models).
3) Briefly explain the purpose of enterprise architectures as input into the Systems Architecture Creation Process. (4 marks)
Requirement Description Metrics Example
4) It can be argued that a Traceability Matrix that contains forward traceability from User Requirements to System Requirements and also from System Requirements to Solution Architecture Design can be used for impact analysis of the change requests. Briefly explain the way such impact analysis would be performed. (4 marks)

Question 3. (8 +4 + 4 + 5 +5 = 26 Marks)
The following questions relate to the operational aspects of the architecture:
Consider the runtime deployment model below. Master product and pricing catalogue data is maintained on the corporate main computing facility. The lead architect made an architectural decision to replicate this data periodically to each checkout computer. The replication periodicity is twice a day.
Figure 2 – Conceptual Operational Model
1) Briefly describe two reasons (justifications) for making such architectural decision (4 Marks for each reason).
2) Briefly describe one alternative that could be considered. (4 Marks)
3) Briefly describe one trade-off that the lead architect made in opting for the data replication approach. (4 Marks)
4) Briefly describe one additional deployment unit that needs to be added at the specified level of the operational model in order to have proposed approach implemented (5 marks)
Checkout
L1, Supermarket
(800 actual locations
across the country)
Master
Product/Price
Catalogue
WAN
D_Catalogue
d_Catalogue
L2, Corporate
Data Centre
Question 8. ((4 + 3) + 3 = 10 Marks)
1) Consider the following diagram from your lecture notes regarding Security.
a) Describe what this figure illustrates, especially focussing on Principals, Policies, Mechanism and Resources and what they are and how they are used. (4 marks)
b) What is the role of Asset Classification in developing a Security architecture? (3 marks)
2) The job of the Security Architect can be described as Managing Risk. Using the table below, illustrate the above statement and how Risk is managed by the Security Architect. (3 marks)
Question 5. (6 + 4 + 4 + 8 = 22 Marks)
The following questions relate to performance engineering and disaster recovery:
Figure 3 – Stress and Volume testing results
1) The project team had performed stress and volume testing and the results are depicted in Figure 3 – Stress and Volume testing results. Could any conclusions be made about scalability of the system based upon results of the test? Provide reasoning for your answer. (6 Marks)
2) The project team was tasked to design a roster scheduling system for large hospital network.
? The solution design phase was concluded on time and within budget with all deliverables produced and signed off.
? The build phase completed on time and the system passed all functional tests.
? The stress and volume (S&V) testing was undertaken to ensure the roster can be produced within an 8 hours batch window.
? After 20 hours from the start of the S&V test, the batch run has not completed.
? The progress analysis was undertaken resulting in realisation that the batch run has another 107 hours to run.
Briefly describe two activities that the architect should have taken early in the SDLC in order to minimise and/or mitigate the risk of the debacle described above. (4 Marks for each)
3) One of the major US banks concluded that if it was to lose its main system, which managed all retail accounts, it would be out of business in 3 days. For this reason bank invested in a separate standby mainframe computer, solely for the purpose of switching over should the main computer become unavailable. During normal operation the standby computer was kept idle.
Transaction Volume or LoadResponse timeVolume for:Single thread testVolume for:Target volume testVolume for:Stress testTargetresponsetimeVolume at whichsystem fails orgoes into serialexecutionResponse timeat which systemis unusableTransaction unusable
What is the key consideration that needs to be carefully designed when architecting the ?switching? from primary computer to the cold standby? (8 Marks)
Question 3. (8 + 4 + 4 + 4 = 20 Marks)
The following question relates to the Architecture Overview Diagram.
Consider the following Architecture Overview Diagram in Figure 1.
Figure 4 –Architecture Overview Diagram
a) Sketch a high-level use case model that would lead to the architecture overview diagram above. (8 Marks)
b) Select three key use cases and provide a brief description for each of those use cases (4 Marks per use case).
Question 3 (6 + 3 + 3 = 12 Marks)
The following questions relate to the Deployment model in the figure below:
1) Identify TWO key system qualities that are explicitly supported by the Deployment model in
the figure. Briefly describe the technique(s) used in the model to support those qualities, and how
they contribute to the quality. (3+3 = 6 marks)
2) Identify TWO key qualities that are not explicitly supported by the Deployment model in the
Figure below (3 marks)
3) Choose ONE system quality from (2) and describe what you may add to the Deployment
model in the Figure below to support this quality. (3 marks)
Question 5 (2 + 8 = 10 Marks)
Below is part of a Quality-Attribute Tree, as you would have constructed in your Assignment 2.
1) What specific method in architecture development uses a Quality-Attribute Tree? (2 marks) 2) Write down some appropriate items for nodes 1—4. For full marks, use items fit your system from Assignment 1. If you can’t up with specific values or examples, write down what type of thing goes in those nodes. (2+1+2+3 = 8 marks)
Question 5. (8 x 2 = 16 Marks)
The following question relates to security and specifically to the placements of nodes into zones. You are asked to complete Error! Reference source not found. indicating the recommended placement for 8 of the nodes with the rationale for your decision.
Figure 5 – Web Mail Service below depicts the architecture overview diagram of a hosted web mail service offered by an Internet Service Provider (ISP) to its customers. The diagram shows 9 nodes with their corresponding connections. Consider the following security zone classification:
? Uncontrolled –anything outside the physical and logical control of the organisation’s network including the internet or machines connected to the internet such as home and business computers or mobile devices.
? Controlled – is the area commonly referred to as the DMZ (De-Militarised Zone). It is where controls exist to restrict access but allow public and third party access on a controlled basis.
? Protected – internal network (WANs and LANs) where access is limited. This zone is restricted to users that are trusted (e.g. employees and contractors and other internal staff).
Figure 5 – Web Mail Service
DB SERVERAPP SERVERHTTP ServerWEB MAIL APPSMTPGATEWAYCORPORATE EMAILGATEWAYMESSAGEDATACUSTTHIN CLIENTEMAIL APPCUSTTHICK CLIENT EMAIL APPADMIN BROWSERODBCSSLSSLPOP3SMTPLDAPSMTPCORPORATETHICK CLIENT EMAILAPPSMTPUSERREGISTRY
The ISP has the following access path policy between zones in Figure 6 (“yes” indicates access path can be created and “no” indicates that any access path is forbidden):
Table 1 – inter-zone connection policy To Uncontrolled Controlled Protected From
Uncontrolled
Yes
Yes
No
Controlled
Yes
Yes
Yes
Protected
No
Yes
Yes
Complete the table below for the 8 remaining node with the recommended security zone placement and your rationale for the placement decision:
Table 2 – Node placement Node Name Security zone placement Rationale
Cust thin client eMail App
Uncontrolled
Customers can access Web Mail application from any computer anywhere on internet.
Admin Browser
User Registry
App Server
DB Server
Cust thick client eMail App
SMTP Gateway
Corporate eMail Gateway
Corporate thick client eMail App

WHAT OUR CURRENT CUSTOMERS SAY

  • Google
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!
Mindi D
Mindi D
Brilliant writers and awesome support team. You can tell by the depth of research and the quality of work delivered that the writers care deeply about delivering that perfect grade.
Samuel Y
Samuel Y
I really appreciate the work all your amazing writers do to ensure that my papers are always delivered on time and always of the highest quality. I was at a crossroads last semester and I almost dropped out of school because of the many issues that were bombarding but I am glad a friend referred me to you guys. You came up big for me and continue to do so. I just wish I knew about your services earlier.
Cindy L
Cindy L
You can't fault the paper quality and speed of delivery. I have been using these guys for the past 3 years and I not even once have they ever failed me. They deliver properly researched papers way ahead of time. Each time I think I have had the best their professional writers surprise me with even better quality work. Elite Academic Research is a true Gem among essay writing companies.
Got an A and plagiarism percent was less than 10%! Thanks!

ORDER NOW

CategoriesUncategorized

Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant
BSN

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts

See Why Our Clients Hire Us Again And Again!


OVER

10.3k
Reviews

RATING
4.89/5
Average

YEARS
13
Mastery

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!

Reliable

Professional

Affordable

Quick

Using this writing service is legal and is not prohibited by any law, university or college policies. Services of Elite Academic Research are provided for research and study purposes only with the intent to help students improve their writing and academic experience. We do not condone or encourage cheating, academic dishonesty, or any form of plagiarism. Our original, plagiarism-free, zero-AI expert samples should only be used as references. It is your responsibility to cite any outside sources appropriately. This service will be useful for students looking for quick, reliable, and efficient online class-help on a variety of topics.