Course Hero Logo

Purohit and madni model based systems architecting

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 7 - 8 out of 8 pages.

PUROHIT AND MADNI: MODEL-BASED SYSTEMS ARCHITECTING AND INTEGRATION APPROACH USING I2DM7Conflicts that arise at lower levels are traced back to thefunctional conflicts. The functions representing the conflicts arethen converted into a single major function and treated as a singleentity. The resulting major function may consist of two or morefunctions under it, which can be grouped. All the external inter-faces of these functions, which are under the major functions,are considered the major function interfaces. The functionalarchitecture matrix is created with all the dependencies, andclusters are identified with the genetic algorithm. The physicalelements allocated to the functions under major functions aregrouped into major physical elements. Further down the line, im-plementation elements and organizational architecture elementsare further grouped into major implementation elements andmajor organizational elements. The final architecture is evalu-ated against a defined process schedule and resource constraints.An integrative architecting technique is employed by definingarchitectural decomposition as a multivariable constraint opti-mization problem [11], [13], [32].It is important to reduce the interactions between modulesin the different layers of the architecture to manage complexitywhile ensuring that the interactions among modules produce therequisite results [33]. While partitioning the system architec-ture, it is essential to consider the system’s legacy elementsand change impact to ensure smooth integration. I2DM canhighlight the Legacy elements and their interlevel and intralevelinteractions, which are crucial to determine the boundaries ofthe modules during architectural partitioning.For a change in any layer, I2DM can be used to identifyall entities that may be affected in all architecture layers (i.e.,operational, functional, physical, implementation, and organi-zational). I2DM allocation relations are used to analyze changeimpacts.Theimpactscanbeafunctionofthenumberofelementsimpacted, the number of interfaces affected, the number ofelements remain unchanged, the number of iterations added orsubtracted from processes (feed-forward or feedback loops), andthe amount of increment or reduction in timing. The impactmetric can be customized based on the purpose and scope ofthe model. Multiple alternatives need to be examined to identifythe best solution. The alternative with the minimum impact isselected. Impact analysis with I2DM also enables identifyingcritical portions of the architecture that need to be avoided.The I2DM change impact analysis is key to determining theboundaries of the modules during the architectural decomposi-tion, specifying the nature and location of major interfaces. Itis important to ensure that boundaries are not passing through atightlyintegratedphysicalsubsystem,throughafuzzyfunctionalregion, or through some critical organizational block. Suchboundaries can create too many likely misfits, too many complexinterfaces, and too many interactions.

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 8 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
AzadMadni
Tags
Systems Engineering, University of Southern California, IEEE Xplore

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture