0% found this document useful (0 votes)
10 views42 pages

SWE2 Lec10

The document outlines key concepts in advanced software engineering, focusing on software system design and security, particularly in concurrency, hardware/software mapping, persistent data management, and global resource handling. It discusses the identification of parallelism, the mapping of subsystems to processors, and the management of persistent data through various storage methods. Additionally, it addresses the importance of access control, software control, and boundary conditions in system design.

Uploaded by

egm.early666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views42 pages

SWE2 Lec10

The document outlines key concepts in advanced software engineering, focusing on software system design and security, particularly in concurrency, hardware/software mapping, persistent data management, and global resource handling. It discusses the identification of parallelism, the mapping of subsystems to processors, and the management of persistent data through various storage methods. Additionally, it addresses the importance of access control, software control, and boundary conditions in system design.

Uploaded by

egm.early666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Advanced Software

Engineering
Dr. Nesma Mahmoud

(Undergraduate - Level 3)
Software System Design
& Security: Part II
Lecture 10
Table of contents
Concurrency: Identification of
01
parallelism
Hardware/Software Mapping:
02 Mapping subsystems
to processors
Persistent Data Management:
03 Storage for entity
objects
Global Resource Handling &
04 Access Control: Who
can access what?)
objects
05 Software Control: Who is in
control?

06 Boundary Conditions:
Administrative use cases.
From Analysis to System Design
Previous lecture
Nonfunctional
System Design
Functional Model
Requirements
8. Boundary
1. Design Goals Conditions
Definition Initialization
Trade-offs Termination
Failure

Functional Model
2. System Decomposition Dynamic Model
Layers vs Partitions
7. Software
Coherence & Coupling
Control Flow
Monolithic vs Event-
Object Model Driven vs Concurrent
Processes
Dynamic Model 4. Hardware/ 5. Data 6. Global Resource
3. Concurrency Software Mapping Management Handling
Special Purpose Systems Persistent Objects Access Control List
Identification of Buy vs Build File system vs vs Capabilities
Parallelism Allocation of Resources Database Security
Network Connectivity
Concurrency
 Identify concurrent threads and address concurrency issues.
 Design goal: response time, performance.

 Threads
 A thread of control is a path through a set of state diagrams on which a single object is active at a time.
 A thread remains within a state diagram until an object sends an event to another object and waits for
another event
 Thread splitting: Object does a nonblocking send of an event.

 Two objects are inherently concurrent if they can receive events at the same time without
interacting
 Inherently concurrent objects should be assigned to different threads of control
 Objects with mutual exclusive activity should be folded into a single thread of control
(Why?)
Concurrency Questions & Implementation
Concurrency Questions
 Which objects of the object model are independent?
 What kinds of threads of control are identifiable?
 Does the system provide access to multiple users?
 Can a single request to the system be decomposed into multiple requests? Can these requests be handled
in parallel?

Implementing Concurrency
 Concurrent systems can be implemented on any system that provides
 physical concurrency (hardware)
or
 logical concurrency (software): Scheduling problem (Operating systems)
From Analysis to System Design
Previous lecture
Nonfunctional
System Design
Functional Model
Requirements
8. Boundary
1. Design Goals Conditions
Definition Initialization
Trade-offs Termination
Failure

Functional Model
2. System Decomposition Dynamic Model
Layers vs Partitions
7. Software
Coherence & Coupling
Control Flow
Monolithic vs Event-
Object Model Driven vs Concurrent
Processes
Dynamic Model 4. Hardware/ 5. Data 6. Global Resource
3. Concurrency Software Mapping Management Handling
Special Purpose Systems Persistent Objects Access Control List
Identification of Buy vs Build File system vs vs Capabilities
Parallelism Allocation of Resources Database Security
Network Connectivity
4. Hardware Software Mapping
 This activity addresses two questions:
 How shall we realize the subsystems: Hardware or Software?
 How is the object model mapped on the chosen hardware & software?
 Mapping Objects onto Reality: Processor, Memory, Input/Output
 Mapping Associations onto Reality: Connectivity

 Much of the difficulty of designing a system comes from meeting externally-imposed


hardware and software constraints.
 Certain tasks have to be at specific locations
Mapping the Objects
 Processor issues:
 Is the computation rate too demanding for a single processor?
 Can we get a speedup by distributing tasks across several processors?
 How many processors are required to maintain steady state load?

 Memory issues:
 Is there enough memory to buffer bursts of requests?

 I/O issues:
 Do you need an extra piece of hardware to handle the data generation rate?
 Does the response time exceed the available communication bandwidth between subsystems or a task
and a piece of hardware?
Mapping the Subsystems Associations: Connectivity
 Describe the physical connectivity of Typical Informal Example of a Connectivity Drawing
the hardware Applicatio Applicatio Applicatio Physical
 Often the physical layer in ISO’s OSI n Client n Client n Client Connectivity
Reference Model TCP/IP Ethernet
 Which associations in the object Logical LAN
model are mapped to physical
connections? Connectivity
Communicatio
 Which of the client-supplier relationships in n Agent for
Application LAN Global
the analysis/design model correspond to Clients Data
physical connections? Communicatio Serve
Communicatio
Backbone Network n Agent for r
n Agent for OODBM
Data Server
Application S
 Describe the logical connectivity Clients
Communicatio Global
(subsystem associations) n Agent for Data
Data Server Serve
 Identify associations that do not r
LAN RDBMS
directly map into physical
connections:
 How should these associations
Local Global
be implemented? Data Data
Logical vs Physical Connectivity and the relationship to
Subsystem Layering

Application Layer Application Layer

Presentation Layer Presentation Layer


Logical
Session Layer Connectivi
Session Layer
Bidirectional ty Layers
associa- tions for
Transport Layer each layer Transport Layer

Network Layer Network Layer

Data Link Layer Data Link Layer


Physical
Physical Layer Physical Layer Connectivi
ty
Processo Processo
r1 r2
Logical vs Physical Connectivity and the relationship to
Subsystem Layering
Subsyste
Layer m1 Subsyste
1 m2
Layer
Layer 1
2
Layer
Layer 2
3 Application Layer Application Layer
Layer
Layer 3
4 Presentation Layer Presentation Layer

Session Layer Session Layer


Bidirectional
associa- tions for
Transport Layer each layer Transport Layer

Network Layer Network Layer

Data Link Layer Data Link Layer

Hardware Hardware

Processo Processo
Hardware/Software Mapping Questions
 What is the connectivity among physical units?
 Tree, star, matrix, ring
 What is the appropriate communication protocol between the subsystems?
 Function of required bandwidth, latency and desired reliability, desired quality of service (QOS)
 Is certain functionality already available in hardware?
 Do certain tasks require specific locations to control the hardware or to permit concurrent
operation?
 Often true for embedded systems
 General system performance question:
 What is the desired response time?
Connectivity in Distributed Systems
 If the architecture is distributed, we need to describe the network architecture (communication
subsystem) as well.

 Questions to ask
 What are the transmission media? (Ethernet, Wireless)
 What is the Quality of Service (QOS)? What kind of communication protocols can be used?
 Should the interaction asynchronous, synchronous or blocking?
 What are the available bandwidth requirements between the subsystems?
 Stock Price Change -> Broker
 Icy Road Detector -> ABS System
Drawing Hardware/Software Mappings in UML
 System design must model static and dynamic structures:
 Component Diagrams for static structures
 show the structure at design time or compilation time
 Deployment Diagram for dynamic structures
 show the structure of the run-time system

 Note the lifetime of components


 Some exist only at design time
 Others exist only until compile time
 Some exist at link or runtime
Component Diagram
 Component Diagram Component Diagram Example
 A graph of components connected by dependency
relationships.
Scheduler reservations
 Shows the dependencies among software
components
UML Component
 source code, linkable libraries, executables UML Interface

 Dependencies are shown as dashed arrows Planner update


from the client component to the supplier
component.
 The kinds of dependencies are
implementation language specific.
GUI

 A component diagram may also be used to show


dependencies on a façade:
 Use dashed arrow the corresponding UML
interface.
Deployment Diagram
 Deployment diagrams are useful for showing a
system design after the following decisions are Compile Time
made Deployment Diagram Example
Dependency
 Subsystem decomposition
 Concurrency
 Hardware/Software Mapping :HostMachine
<<database>>
meetingsDB
 A deployment diagram is a graph of :Scheduler
nodes connected by communication
associations. Runtime
Dependency
 Nodes are shown as 3-D boxes.
 Nodes may contain component instances. :PC
 Components may contain objects (indicating that
the object is part of the component)
:Planner
From Analysis to System Design
Previous lecture
Nonfunctional
System Design
Functional Model
Requirements
8. Boundary
1. Design Goals Conditions
Definition Initialization
Trade-offs Termination
Failure

Functional Model
2. System Decomposition Dynamic Model
Layers vs Partitions
7. Software
Coherence & Coupling
Control Flow
Monolithic vs Event-
Object Model Driven vs Concurrent
Processes
Dynamic Model 4. Hardware/ 5. Data 6. Global Resource
3. Concurrency Software Mapping Management Handling
Special Purpose Systems Persistent Objects Access Control List
Identification of Buy vs Build File system vs vs Capabilities
Parallelism Allocation of Resources Database Security
Network Connectivity
5. Data Management
 Some objects in the models need to be persistent
 Provide clean separation points between subsystems with well- defined interfaces.
 A persistent object can be realized with one of the following
 Data structure
 If the data can be volatile
 Files
 Cheap, simple, permanent storage
 Low level (Read, Write)
 Applications must add code to provide suitable level of abstraction
 Database
 Powerful, easy to port
 Supports multiple writers and readers
File or Database?
 When should you choose a file?
 Are the data voluminous (bit maps)?
 Do you have lots of raw data (core dump, event trace)?
 Do you need to keep the data only for a short time?
 Is the information density low (archival files,history logs)?
 When should you choose a database?
 Do the data require access at fine levels of details by multiple users?
 Must the data be ported across multiple platforms (heterogeneous systems)?
 Do multiple application programs access the data?
 Does the data management require a lot of infrastructure?

Database Management System


 Contains mechanisms for describing data, managing persistent storage and for providing a backup mechanism
 Provides concurrent access to the stored data
 Contains information about the data (“meta-data”), also called data schema.
Issues To Consider When Selecting a Database
 Storage space
 Database require about triple the storage space of actual data
 Response time
 Mode databases are I/O or communication bound (distributed databases). Response time is also affected
by CPU time, locking contention and delays from frequent screen displays
 Locking modes
 Pessimistic locking: Lock before accessing object and release when object access is complete
 Optimistic locking: Reads and writes may freely occur (high concurrency!) When activity has been completed,
database checks if contention has occurred. If yes, all work has been lost.
 Administration
 Large databases require specially trained support staff to set up security policies, manage the disk space,
prepare backups, monitor performance, adjust tuning.
Object-Oriented Databases
 Support all fundamental object modeling concepts
 Classes, Attributes, Methods, Associations, Inheritance
 Mapping an object model to an OO-database
 Determine which objects are persistent.
 Perform normal requirement analysis and object design
 Create single attribute indices to reduce performance bottlenecks
 Do the mapping (specific to commercially available product). Example:
 In ObjectStore, implement classes and associations by preparing C++ declarations for each class and each
association in the object model
Relational Databases
 Based on relational algebra
 Data is presented as 2-dimensional tables. Tables have a specific number of columns and
and arbitrary numbers of rows
 Primary key: Combination of attributes that uniquely identify a row in a table. Each table should
have only one primary key
 Foreign key: Reference to a primary key in another table
 SQL is the standard language defining and manipulating tables.
 Leading commercial databases support constraints.
 Referential integrity, for example, means that references to entries in other tables actually exist.
Mapping an object model to a relational database

 UML object models can be mapped to relational databases:


 Some degradation occurs because all UML constructs must be mapped to a single relational database
construct - the table.
 UML mappings
 Each class is mapped to a table
 Each class attribute is mapped onto a column in the table
 An instance of a class represents a row in the table
 A many-to-many association is mapped into its own table
 A one-to-many association is implemented as buried foreign key
 Methods are not mapped
Turning Object Models into Tables I
Many-to-Many Associations: Separate Table for
Association
City * Serves Airport
*
airportCode
cityName airportName

Separate
Primary Key Table

City Table Airport Table Serves Table

airportCode airportName cityName airportCode


cityName IAH Intercontinental Houston IAH
Houston HOU Hobby Houston HOU
Albany ALB Albany County Albany ALB
Munich MUC Munich Airport Munich MUC
Hamburg HAM Hamburg HAM
Hamburg Airport
Turning Object Models into Tables II

1-To-Many or Many-to-1 Associations: Buried Foreign Keys


Portfolio
Transaction *
portfolioID
transactionID ...
Foreign Key

Transaction Table Portfolio Table


transactionID portfolioID portfolioID ...
Data Management Questions
 Should the data be distributed?
 Should the database be extensible?
 How often is the database accessed?
 What is the expected request (query) rate? In the worst case?
 What is the size of typical and worst-case requests?
 Do the data need to be archived?
 Does the system design try to hide the location of the databases (location transparency)?
 Is there a need for a single interface to access the data?
 What is the query format?
 Should the database be relational or object-oriented?
From Analysis to System Design
Previous lecture
Nonfunctional
System Design
Functional Model
Requirements
8. Boundary
1. Design Goals Conditions
Definition Initialization
Trade-offs Termination
Failure

Functional Model
2. System Decomposition Dynamic Model
Layers vs Partitions
7. Software
Coherence & Coupling
Control Flow
Monolithic vs Event-
Object Model Driven vs Concurrent
Processes
Dynamic Model 4. Hardware/ 5. Data 6. Global Resource
3. Concurrency Software Mapping Management Handling
Special Purpose Systems Persistent Objects Access Control List
Identification of Buy vs Build File system vs vs Capabilities
Parallelism Allocation of Resources Database Security
Network Connectivity
6. Global Resource Handling

 Discusses access control


 Describes access rights for different classes of actors
 Describes how object guard against unauthorized access

Defining Access Control


 In multi-user systems different actors have access to different functionality and data.
 During analysis we model these different accesses by associating different use cases with
different actors.
 During system design we model these different accesses by examing the object model by
determining which objects are shared among actors.
 Depending on the security requirements of the system, we also define how actors are authenticated to the
system and how selected data in the system should be encrypted.
Access Matrix
 We model access on classes with an Access Matrix Implementations
access matrix.  Global access table: Represents explicitly every cell in
 The rows of the matrix represents the actors the matrix as a (actor,class, operation) tuple.
of the system  Determining if an actor has access to a specific object requires
 The column represent classes whose access looking up the corresponding tuple. If no such tuple is found,
we want to control. access is denied.
 Access control list associates a list of (actor,operation)
 Access Right: An entry in the access pairs with each class to be accessed.
matrix. It lists the operations that can be  Every time an object is accessed, its access list is checked for
executed on instances of the class by the the corresponding actor and operation.
actor.  Example: guest list for a party.
 A capability associates a (class,operation) pair with
an actor.
 A capability provides an actor to gain control access to an
object of the class described in the capability.
 Example: An invitation card for a party.
 Which is the right implementation?
Global Resource Questions
 Does the system need authentication?
 If yes, what is the authentication scheme?
 User name and password? Access control list
 Tickets? Capability-based
 What is the user interface for authentication?
 Does the system need a network-wide name server?
 How is a service known to the rest of the system?
 At runtime? At compile time?
 By Port?
 By Name?
From Analysis to System Design
Previous lecture
Nonfunctional
System Design
Functional Model
Requirements
8. Boundary
1. Design Goals Conditions
Definition Initialization
Trade-offs Termination
Failure

Functional Model
2. System Decomposition Dynamic Model
Layers vs Partitions
7. Software
Coherence & Coupling
Control Flow
Monolithic vs Event-
Object Model Driven vs Concurrent
Processes
Dynamic Model 4. Hardware/ 5. Data 6. Global Resource
3. Concurrency Software Mapping Management Handling
Special Purpose Systems Persistent Objects Access Control List
Identification of Buy vs Build File system vs vs Capabilities
Parallelism Allocation of Resources Database Security
Network Connectivity
7. Decide on Software Control
• Choose implicit control (non-procedural, declarative languages)
 Rule-based systems
 Logic programming
• Choose explicit control (procedural languages): Centralized or decentralized
• Centralized control: Procedure-driven or event-driven
 Procedure-driven control
 Control resides within program code. Example: Main program calling procedures of
subsystems.
 Simple, easy to build, hard to maintain (high recompilation costs)
 Event-driven control
 Control resides within a dispatcher calling functions via callbacks.
 Very flexible, good for the design of graphical user interfaces, easy to extend
Event-Driven Control Example: MVC
 Model-View-Controller Paradigm (Adele Goldberg, Smalltalk 80)

:Control

Update :View
Model has
Update Update
changed

:Model :View
:View
Software Control

 Decentralized control
 Control resides in several independent objects.
 Possible speedup by mapping the objects on different processors,
increased communication overhead.
 Example: Message based system.
Centralized vs. Decentralized Designs
 Should you use a centralized or decentralized design?
 Take the sequence diagrams and control objects from the analysis model
 Check the participation of the control objects in the sequence diagrams
 If sequence diagram looks more like a fork: Centralized design
 The sequence diagram looks more like a stair: Decentralized design

 Centralized Design
 One control object or subsystem ("spider") controls everything
 Pro: Change in the control structure is very easy
 Con: The single conctrol ojbect is a possible performance bottleneck

 Decentralized Design
 Not a single object is in control, control is distributed, That means, there is more than one control object
 Con: The responsibility is spread out
 Pro: Fits nicely into object-oriented development
From Analysis to System Design
Previous lecture
Nonfunctional
System Design
Functional Model
Requirements
8. Boundary
1. Design Goals Conditions
Definition Initialization
Trade-offs Termination
Failure

Functional Model
2. System Decomposition Dynamic Model
Layers vs Partitions
7. Software
Coherence & Coupling
Control Flow
Monolithic vs Event-
Object Model Driven vs Concurrent
Processes
Dynamic Model 4. Hardware/ 5. Data 6. Global Resource
3. Concurrency Software Mapping Management Handling
Special Purpose Systems Persistent Objects Access Control List
Identification of Buy vs Build File system vs vs Capabilities
Parallelism Allocation of Resources Database Security
Network Connectivity
8. Boundary Conditions
 Most of the system design effort is concerned with steady-state behavior.
 However, the system design phase must also address the initiation and finalization of the system.
This is addressed by a set of new uses cases called administration use cases
 Initialization
 Describes how the system is brought from an non initialized state to steady-state ("startup use cases”).
 Termination
 Describes what resources are cleaned up and which systems are notified upon termination ("termination use
cases").
 Failure
 Many possible causes: Bugs, errors, external problems (power supply).
 Good system design foresees fatal failures (“failure use cases”).
Example: Administrative Use cases for MyTrip
 Administration use cases for MyTrip (UML use case diagram).
 An additional subsystems that was found during system design is the server. For this new
subsystem we need to define use cases.

 <<include>>
ManageServer includes all the
functions necessary to start up and PlanningService
StartServer
shutdown the server. Administrator <<include>>

ManageServer ShutdownServer

<<include>>

ConfigureServer
ManageServer Use Case
Boundary Condition Questions
 1 Initialization
 How does the system start up?
What data need to be accessed at startup time?
 What services have to registered?

 What does the user interface do at start up time?


 How does it present itself to the user?

 2 Termination
 Are single subsystems allowed to terminate?
 Are other subsystems notified if a single subsystem terminates?
 How are local updates communicated to the database?
 3 Failure
 How does the system behave when a node or communication link fails? Are there backup communication links?
 How does the system recover from failure? Is this different from initialization?
Modeling Boundary Conditions
 Boundary conditions are best modeled as use cases with actors and objects.
 Actor: often the system administrator
 Interesting use cases:
 Start up of a subsystem
 Start up of the full system
 Termination of a subsystem
 Error in a subystem or component, failure of a subsystem or component
 Task:
 Model the startup of the any system (washing machine, facebook) as a set of use cases.
Summary
In this lecture, we reviewed the activities of system design :
 3Concurrency identification
 4 Hardware/Software mapping
 5 Persistent data management
 6 Global resource handling
 7 Software control selection
 8 Boundary conditions

Each of these activities revises the subsystem decomposition to address a specific issue.

Once these activities are completed, the interface of the subsystems can be defined.

You might also like