Lecture14: Tradeoff Analysis: ATA Method
Lecture 14: Architecture Tradeoff Analysis
.
Architecture Tradeoff Analysis Method (ATAM)
.
Why Use ATAM?
.
ATAM
.
ATAM
.
ATAM - Step 1
.
ATAM - Step 2
.
ATAM - Step 3
.
ATAM - Step 4
.
ATAM - Step 5
.
ATAM - Step 6
.
ATAM - Step 7
.
Case Study
.
Functional View of System
.
Performance Scenarios
.
Performance Requirements
.
Availability Scenarios
.
Availability Requirements
.
Security Scenarios
.
Security Requirements
.
Option 1: Client-Server
.
Option 2: Client-Server-Server
.
Option 3: Client-Intelligent Cache Server
.
Performance Assumptions
.
Performance Analysis
.
Availability Assumptions
.
Availability Analysis of Option 1: Markov Model
.
Availability of Option 1
.
Availability Analysis of Option 2: Markov Model
.
Availability of Option 2
.
Availability Analysis of Option 3: Markov Model
.
Availability of Option 3 (1 Min Cache)
.
Availability of Option 3 (5 Min Cache)
.
Initial Results
.
Sensitivity Analysis
.
Sensitivity Analysis -2
.
Sensitivity Analysis -3
.
Interim Summary
.
Security Analysis
.
Option 1a: Client-Server MIM Attack
.
Option 1b: Client-Server Spoof Attack
.
Security Assumptions
.
Security Analysis: Options 1-3 MIM Attack Scenario
.
Security Analysis: Options 1-3 Spoof Attack
.
Ramifications
.
Refined Architectures
.
Options 1-3 with Encryption
.
Options 1-3 with Intrusion Detection
.
Sensitivity Analysis
.
Tradeoff Analysis
.
End of Case Study
.
Why Focus on Software Architecture Analysis?
.
Is It Cost Effective?
.
Can I Believe These Numbers?
.
© 1998 Carnegie Mellon Computer Science
BACK
Heather L. Marko
Modified: 5/21/98