System Architect Tutorial (4th edition)

Chapter 1 Composition and Computer Architecture 14
1.1 computer systems 14
1.1.1 14 composed of computer hardware
1.1.2 classification system configuration of a computer 15
1.1.3 system with a complex instruction set RISC System 17
1.1.4 bus 18
1.2 the memory system 19
1.2.1 main memory 20
1.2.2 auxiliary memory 21 is
1.2.3Cache memory 22
1.3 28 pipeline
1.3.1 pipeline cycle 28
1.3.2 28 calculates the execution time pipeline
1.3.3 pipeline throughput 29
1.3.4 pipeline acceleration versus 29
30 Chapter 2 OS
2.1 operating system and the type of structure 30
defined 2.1.1 operating system 31
classification 31 2.1.2 OS
2.2 operating system, the basic principles of 31
management process 31 2.2.1
2.2.2 storage management 40
device management 45 2.2.3
2.2.4 file management 46
2.2.5 job Manager 51 is
54 Chapter 3 database system
3.1 database management system type 53
3.2 53 Paradigm database schema and
structure of the pattern database 53 3.2.1
3.2.2 data model 55

3.2.2 Relational Algebra 56
normalized data 59 3.2.4
3.2.5 denormalization 62 is
63 is 3.3 database design
method of database design 3.3.1 64
3.3.2 Basic design database 66 in step
3.3.3 Requirements Analysis 68
3.3.4 concepts design 69
3.3.5 logical structure design 73
3.3.6 physical design 79
3.4 80 transaction management
3.4.1 concurrency control 81
3.4.2 failure and recovery 82
3.5 backup and restore 84
3.6 86 distributed database system
3.6.1 distributed concept database 86
89 distributed database architecture 3.6.2
3.7 94 data warehouse
concept data warehouse 94 3.7.1
3.7.2 data warehouse structure 96
3.7.3 implementation data warehouse 98
3.8 100 data mining
3.8.1 data mining concept 100
3.8.2 data mining function 102
3.8.3 103 commonly used data mining techniques
3.8.4 data mining process 105
3.9NoSQL 106
3.10 108 large data
Chapter 4 computer network 109
4.1 network architecture and protocols 109

Networking model 110 4.1.1
4.1.2 common network protocols 112
4.1.3 114 the IPv6
4.2 LAN and WAN 117
4.2.1 117 LAN Fundamentals
4.2.2 WLAN 118
4.2.3 WAN technologies 121
4.2.4 Network Access technology 121
4.3 123 internetworking device with a conventional
4.4 126 network engineering
4.4.1 network planning 126
4.4.2 128 network design
4.4.3 network embodiment 130
4.5 network storage technology 131 is
134 4.6 cabling
performance evaluation system Chapter 5 135
5.1 performance indicator 136
5.1.1 136 computer
5.1.2 network 139
5.1.3 operating system 140
5.1.4 DBMS 140
5.1.5Web server 141
5.2 141 performance calculating
5.3 performance design 143
5.3.1 143 Amdahl solution
5.3.2 load balancing 144
5.4 performance evaluation 147
5.4.1 147 benchmark
performance evaluation server 148 5.4.2Web
5.4.3 system monitor 149

Chapter 6: Development Method 150
6.1 software life cycle 150
6.2 Software Development Model 152
6.2.1 waterfall model 152
6.2.2 Evolution Model 155
6.2.3 Spiral Model 155
6.2.4 incremental model 156
6.2.5 component assembly model 157
6.3 unified process 158
6.4 agile 161
6.4.1 extreme programming 162
6.4.2 feature driven development 166
6.4.3Scrum 168
6.4.4 crystal method 172
6.4.5 other agile methods 174
6.5 software reuse 174
6.5.1 software reuse 174
6.5.2 component technology 175
design 176 6.6-based architecture software
6.6.1ABSD methods and life cycle 176
6.6.2 architecture model-based software development 179
6.7 formal methods 185
Chapter 7: system planning 186
proposed projects and selected 186 7.1
7.1.1 186 project goals and motivations of project
selection and identifying projects 187 7.1.2
result 7.1.3 projects proposed and selected 191
7.2 192 benefit analysis and feasibility Study
content 7.2.1 feasibility study 192
7.2.2 cost-benefit analysis 194

195 7.2.3 feasibility analysis
to develop and improve 196 7.3 program
analysis and comparison of old and new systems 7.4 199
7.4.1 Evaluation of the legacy system 200
Evolution Strategy 7.4.2 legacy systems 204
Chapter 8: System Analysis and Design Methods 205
8.1 definitions problems attributed model 206
8.1.1 206 analysis
8.1.2 problem definition 209
8.2 211 requirements analysis and design software
tasks and process requirement analysis 211 8.2.1
8.2.2 how the system design 214
8.2.3 software design the tasks and activities 215
8.3 216 structured analysis and design
8.3.1 structural analysis 216
8.3.2 221 structured design
8.3.3 design module 223
8.4 object-oriented analysis and design 225
basic concepts of object-oriented 8.4.1 225
8.4 .2 Object-oriented analysis 228
8.4.3 unified modeling language 229
8.5 243 user interface design
principles of user interface design 243 8.5.1
8.5.2 user interface design process 244
8.6 workflow Designer 245
8.6.1 workflow design Overview 245
8.6 .2 workflow management system 247
design 8.7 simple distributed application system 248 computer
integrated with the design of the system 8.8 runtime environment 250
251 8.9 system transition plan

Chapter 9: Software Architecture Design 253
9.1 Software Architecture Overview 253
253 9.1.1 definition of software architecture
9.1.2 The importance of software architecture 255
9.1.3 architectural model 256
9.2 architecture requirements and software quality attributes 258
9.2.1 Software Quality attribute 258
9.2.26 and implemented a quality attribute 260
9.3 268 style of software architecture
9.3.1 software architecture style classification 268
9.3.2 style data stream 269
9.3.3 call / return style 271
9.3.4 274 independent member style
9.3.5 virtual 275 style machine
9.3.6 style warehouse 275
9.4 276 style hierarchical system architecture
9.4.1 Layer and Layer C / S architecture style 277
9.4.2B / S architectural style 278
9.4.3MVC architectural style 280
9.4.4MVP architectural style 281
9.5 service-oriented architecture 282
9.5.1SOA 283 Overview
of key technologies 9.5.2SOA 285
implementation 9.5.3SOA 287
9.5.4 micro services 291
9.6 295 architecture design
9.7 software architecture documentation 297
9.8 software architecture assessment 301
9.8.1 software architecture the method of assessment 301
9.8.2 architecture tradeoff analysis method 301

Cost-benefit analysis 9.8.3 303
9.9 member 304 and multiplexed
9.9.1 commercial standards member 305
9.9.2 cluster applications and components of the system 306
9.9.3 reuse-based structures 307 developed
product lines and phylogeny 9.10 308
9.10.1 multiplexed with product line 308
9.10.2 309 framework based product line
development model product lines 310 9.10.3
9.10.4 particular art software architecture 311
9.10.5 and system architecture evolution 312
9.11 view of the software architecture 313
9.11 .1 classification software view 313
9.11.2 module types and styles view 314
9.11.3C view of the type and style & C 316
9.11.4 allocation view type and style 318
9.11.5 mapping between various types of views 320
Chapter 10 : design patterns 320
10.1 320 design pattern outlined
the concept of design patterns 321 10.1.1
composed 10.1.2 design pattern 321
10.1.3GoF design patterns 322
10.1.4 other design patterns 324
10.1.5 software architecture and design patterns 325
10.1.6 design pattern classification 325
10.2 and design patterns to achieve 326
10.2.1Abstract Factory's model 326
10.2.2Singleton mode 329
10.2.3Decorator mode 330.
10.2.4Facade / 332 mode the Facade the Session

10.2.5Mediator mode 334
10.2.6Observer mode 336
10.2.7Intercepting the Filter mode 339
10.3 342 Design Models for
Chapter 11: Testing Methods Review 342
11.1 Test Method 343
343 11.1.1 beta software
11.1.2 white box and black box testing 345
11.1.3 defect classification and level 348
11.1.4 debugging 349
350 11.2 assessment methods
11.3 verification and validation 352
11.4 test automation 353
11.5 Object-oriented test 354
Chapter 12: embedded system design 356
12.1 Introduction to embedded systems 357
12.2 consisting of embedded systems 358
12.2.1 hardware architecture 358
12.2.2 software architecture 364
12.3 embedded development platform and debug environment 365
12.3.1 embedded system software development platform 365
12.3.2 debugging embedded development 367
12.4 embedded network system 371
12.4.1 fieldbus 371
12.4.2 family information 372
11.4.3 wireless data communication network 372
12.4.4 373 embedded Internet
12.5 embedded database management system 374
Features 12.5.1 environment of 375
12.5.2 system components and key technologies 375

12.6 real-time systems and embedded operating system 379
real-time embedded systems concepts 12.6.1 379
12.6.2 Overview of embedded operating systems 380
12.6.3 Real-time embedded operating system 382
12.6.4 mainstream embedded operating system introduced 385
12.7 Embedded system development and design 386
12.7.1 embedded system design Overview 386
12.7.2 development model and design process 389
core technology of embedded system design 12.7.3 391
12.7.4 embedded development design environment 394
12.7.5 embedded software design model 394
12.7.6 requirements analysis 398
12.7.7 system 400
12.7.8 system integration and testing 407
Chapter 13: development management 407
range of 13.1 projects, time and cost 408
13.1.1 project scope management 408
13.1.2 project cost management 409
13.1.3 project time management 410
13.2 411 configuration management and document management
concept 13.2.1 software configuration management 411
13.2.2 software configuration management solution 412
13.2.3 software document management 416
13.3 software requirements management 420
13.3.1 demand change 420
13.3.2 requirements Traceability 421
13.4 software development quality and risk 422
13.4.1 software quality management 422
13.4.2 Project Risk Management 425
13.5 430 Human Resource Management

Operation and evaluation software 13.6 436
13.7 Software Process Improvement 436
Chapter 14: Fundamentals Information Systems 439
14.1 Information System Overview 439
system consisting of 439 14.1.1 information
lifecycle 14.1.2 Information Systems 441
14.1.3 information system construction principle 443
14.1.4 information system development method 445
14.2 447 information systems engineering
concepts 14.2.1 information system Engineering 447
content 450 14.2.2 information systems engineering
overall plan of 453 14.2.3 information systems engineering
methodology 14.2.4 Master plan 460
14.3 government information technology and e-government 465
14.3.1 information technology strategy and course of our government 466
14.3.2 content of e-government 470
14.3.3 process model and technology model of e-government 472
14.4 476 enterprise information and e-commerce
enterprise information 14.4.1 Overview 476
14.4.2 enterprise resource planning 479
14.4.3 customer relationship management 484
14.4.4 product data management 488
14.4.5 enterprise portal 491
14.4.6 EAI 494
14.4.7 supply chain management 497
14.4 .8 e-commerce Overview 500
14.6 knowledge management and Business intelligence 502
14.6.1 knowledge management 502
14.6.2 Business Intelligence 504
14.7 Business Process Reengineering 505

Chapter 15: 508 based on the development of middleware
509 15.1 middleware technology
concept 15.1.1 middleware 509
15.1.2 Category middleware 511
15.1.3 Middleware Products 512
15.2 application server technology 513
15.2.1 application server concept 514
15.2.2 primary application server 516
15.3 518 the J2EE
15.3.1 layer 519 represents
15.3.2 application service layer 520.
15.4 523 .NET
15.4.1.NET internet 523
15.4.2.NET frame 526
15.5 531 EAI
15.6 heavyweight and lightweight architecture architecture 535
15.6.1Struts frame 535
15.6.2Spring frame 536
15.6.3Hibernate frame 537
15.6.4 based on Struts, Spring and Hibernate lightweight architecture 539
15.6.5 lightweight framework and heavyweight framework discussion 540
Chapter 16: security and privacy design 541
16.1 encrypt and decrypt 542
16.1.1 symmetric key encryption algorithm 542
16.1.2 asymmetric key encryption algorithm 543
16.2 digital signatures and digital watermarking 545
16.2.1 digital signature 546
16.2.2 digital envelope 548
16.3 549 digital certificate and key management
16.3.1 Key Distribution Center 549

16.3.2 digital certificates and Public Key Infrastructure 551
16.4 Security Protocol 555
16.4.1IPSec protocol outlined 555
16.4.2SSL protocol 560
16.4.3PGP protocol 563
16.5 567 with the computer virus prevention
16.5.1 computer virus Overview 567
16.5.2 Network new trends in viruses in the environment 569
16.5.3 computer virus detection and removal 570
16.5.4 computer virus prevention 572
16.6 identity and access control 573
16.6.1 authentication technology 574
16.6.2 access control 580
16.7 network security system 582
16.7.1OSI security architecture 583
16.7.2VPN in network security application 585
588 16.8 security system design
16.8.1 physical security and design issues 588
and its application 16.8.2 firewall security system 589
16.8.3 intrusion detection system 591
16.9 594 safety regulations
16.9.1 safety management system 594
16.9.2 computer crime and regulations 595
Chapter 17: reliability analysis and design system 598
17.1 High Availability Overview 598
17.2 system fault model 599
17.2.1 source of the failure and performance 599
17.2.2 several common fault models 600
17.3 System configuration 601
17.3.1 601 Single Fault Tolerance

17.3.2 hot backup technology 602
17.3.3 server clustering technology 603
17.4 reliability model 603
17.4.1 time model 604
17.4.2 Fault implant model 604
17.4.3 606 data model
reliability analysis and reliable system 17.5 calculating 606
17.5.1 combination model 607
17.5.2 Markov models 610
17.6 measures to improve the reliability of the systems 612
17.6.1 hardware redundancy 613
17.6.2 redundant information 616
17.7 617 backup and recovery
Chapter 18: software intellectual property protection 618
18.1 copyright law and regulations embodiment 619
18.1.1 619 copyright law object
body 620 of the copyright law 18.1.2
18.1.3 620 copyright
18.2 computer software protection 622
18.3 Trademark law and Ordinance embodiment 623
18.4 law and patents regulations 625
18.5 anti-unfair competition law 626
Chapter 19: standardized knowledge 628
19.1 Introduction 628 standardization
19.2 standard classification and standard type 628
19.2.1 standard grade 628
19.2.2 mandatory standards and recommended standards 630
Chapter 20: applied Mathematics 632
20.1 Fertilizers 632
20.1.1 Network Planning Technology 632
20.1.2 Linear Programming 636
20.1.3 decision theory 639
20.1.4 Game Theory 643
20.2 Mathematical Modeling 644
Chapter 21: virtualization, cloud computing and Internet of things 646
21.1 646 virtualization
21.1.1 classification virtualization technology 646
21.1.2 virtual model 649
21.2 cloud 650
21.2.1 650 features cloud
type cloud 651 21.2.2
application cloud 652 21.2.3
21.3 things 653
21.3.1 thereof networking hierarchy 654
21.3.2 IOT 655 fields related art
application 21.3.3 IOT 660

Guess you like

Origin www.cnblogs.com/lizhigang/p/11081831.html