Software Methodology Report: Software Architecture and Layers

Verified

Added on  2022/08/17

|3
|504
|12
Report
AI Summary
This report delves into the intricacies of software methodology, exploring the architecture and design of information technology systems. It begins by analyzing the security implications of different storage models, comparing the advantages and disadvantages of centralized and decentralized systems, as well as other storage approaches. The report then examines the functional layer, emphasizing its importance in structuring software complexity. It describes how the functional layer, composed of various components like database, protocols, and run-time elements, contributes to application execution and how communication between components influences the overall system. Furthermore, the report discusses the hierarchical nature of the functional layer, including the interaction of hardware at the lower level and the operating system at the higher level. It also highlights the advantages of the stack architecture, such as its support for agile development and its standardized communication protocols.
Document Page
Running head: SOFTWARE METHODOLOGY 1
Software Methodology
Student’s Name
University
Course
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SOFTWARE METHODOLOGY 2
Answer to question one
The security of the information technology system it depends on the architecture design of
the information storage model. According to Wang, Ma, Zheng, & Wu (2019), each storage
model has its advantage and disadvantage.
A centralized model has the advantage of providing efficiency, consistency, and affordable
data management. System administrator is required to keep information up-to-date once
across all networks using a few minutes. However, once the master server storage failure, it
disadvantages the whole system since it is "one individual machine" architecture.
The decentralized model helps to offer less and distributed workload on several systems than
depending on a single server. Also, the system has the disadvantage of consuming more
resources within the network, therefore increasing the cost of maintenance and burden to
other resources.
However, other information is neither stored in a central or decentralized place, thus being
stored in many different locations. The model encourages greater privacy since the
information has several encryptions to varying points as an advantage. At the same time, it
makes it difficult to track small data on the whole as an advantage.
Answer to question two
A stack of the functional layer is essential to provide software complexity while structuring.
The mechanism involves a collection of different and independent components that works
together in getting application execution. The layer may composite of database and functional
call, protocols, run-time elements, architectural layer, operating system, and system
components, which are hierarchical modified. The complexity of the software system is
enhanced through how component communication is performed. The lower level hierarchy of
Document Page
SOFTWARE METHODOLOGY 3
the functional layer is composed of interactions of hardware, while the higher level is
specifically operating, which serves the end-user. However, this kind of functional layer
system has a complex series of instruction which traverses over the stack again and again.
Additionally, the stack architecture system provides more modern application with increased
complexity which makes easy to have agile manner response. Finally, stack components offer
standard and open communication protocol, which facilitates interchangeable program
interfaces all through the software product (Tong, Liu, & Wang, 2018).
References
Tong, H., Liu, B., & Wang, S. (2018). Software defect prediction using stacked denoising
autoencoders and two-stage ensemble learning. Information and Software
Technology, 96, 94-111.
Wang, H., Ma, W., Zheng, H., & Wu, Q. (2019, December). Distributed Secure Storage
System Based on Blockchain and TPA. International Conference on Network and
System Security (pp. 255-271). Springer, Cham.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]