Consider a legacy, fax-based, problem-reporting system for an aircraft manufacturer. You are part of a reengineering project replacing the core of the system by a computer-based system, which includes a database and a notification system. The client requires the fax to remain an entry point for problem reports. You propose an E-mail entry point. Describe a subsystem decomposition, and possibly a design pattern, which would allow both interfaces.
What will be an ideal response?
There are two main approaches to this problem. The first approach is to design the system with an E-mail frontend
and add a subsystem which converts fax problem reports to E-mail (possibly with the assistance of an actor). The E-
mail front end then becomes a single point of entry into the problem reporting system. The second approach (depicted
in Figure 7-2) is to provide a network level interface to the problem reporting system (e.g., using RPC, RMI,
CORBA, or plain sockets) and to build two different clients to the system, one processing E-mail, the other
processing fax reports. The first solution is cheaper to realize and would be appropriate if the fax front end is short
lived or no other frontends are planned. The second solution is more general and allows the addition of other
frontends in the future. Design goals defined during system design would be used to decide between these two
alternatives. The main point the student should realize is that there are alternative solutions to subsystem
decomposition issues and that design goals can be used to sort them out.
Computer Science & Information Technology
You might also like to view...
What is the function used to randomly choose an element from an array?
a. first item from list b. it item from list c. random item from list d. random number e. None of these
Windows Remote Assistance connects two computers over the Internet or within a local area network
Indicate whether the statement is true or false
The Break statement cannot be used in a While or a Do While loop.
Answer the following statement true (T) or false (F)
Jane, a security administrator, wants to prevent users in sales from accessing their servers after 6:00 p.m., and prevent them from accessing accounting's network at all times. Which of the following should Jane implement to accomplish these goals?
A. Separation of duties B. Time of day restrictions C. Access control lists D. Mandatory access control E. Single sign-on