1. The process of refining the architecture into its constituent components marks the beginning of the structure if the end system.
2. For this purpose we initially consider the classes which were acquired during the classes form the major entities of an application domain, hence, turn out to be the important aspects of an end system.
3. The development of structure representing the system must also address the infrastructure domain.
4. The end system must also include infrastructure components that support the components of an application domain.
Example: If safe security is considered, few highly valued components of it are defined below,
1).Alarm processing
Capable of processing, detecting and also responding to all alarm conditions.
2). Control Panel Processing
Hence, usually the control panel related activities are managed.
3). External Communication Management
Here, the activities involved during a security function communicating with various external entities are coordinated as well as managed.
4).Detector Management
Here, usually the accessing of detector associated with the system is co-ordinated.
Defining Instantiations of the system:
Instantiating of architecture is necessary whenever we are done with the following aspects of designing,
1. The context belonging to the system is developed.
2.The archetype that indicates the important abstractions within the problem domain has been defined.
3. We are known for the overall system architecture.
4. Finally, We identify all the important components belonging to the end software.
5. Now begins the instantiation process.
6. Here, We display the product with an intention that it is well suited for the given problem, all its accessories are perfectly connected and the end system architecture structure o formed is ultimate in all aspects.
7. Here, we considered a safe home security system architecture.
8. In the figure, the detector management component communicates with the sensor component for implementing concurrent pulling of all the sensor objects used by the system.
9. The questions posed in the preceding section provide a preliminary assessment of the architectural style chosen for a given system.
10. However, a more complete method for evaluating the quality of architecture is essential if the design is to be accomplished effectively.
11. We consider two different approaches to the analysis of the alternative architectural design.
12. The first method uses an iterative method to assess design trade-offs.
13. The second approach applies a pseudo-quantitative technique for assessing design quality.
14. The software engineering institute developed an iterative evaluation process for software architectures called the architecture trade-off analysis method.
15. The system represents the user's point of view using a use case diagram.
