BITS WILP Software Architectures End Sem 2016-H2 (Regular)


Birla Institute of Technology & Science, Pilani
Work-Integrated Learning Programmes Division
First Semester 2016-2017

Comprehensive Examination
(EC-3 Regular)

Course No.                  :  SS ZG653
Course Title                 :  Software Architecture
Nature of Exam          : Open Book
Weightage                   : 50%
Duration                      : 3 Hours 
Date of Exam              : 05/11/2016    (FN)
No. of pages: 1
No. of questions: 4
Note:
1.       Please follow all the Instructions to Candidates given on the cover page of the answer book.
2.       All parts of a question should be answered consecutively. Each answer should start from a fresh page. 
3.       Assumptions made if any, should be stated clearly at the beginning of your answer.

Q.1.        In cloud computing paradigm, what do you mean by Eventual Consistency? Explain with a scenario or context where it is useful. Justify with suitable example.                    [5]

Q.2.        Enterprises are still afraid of migrating the application to the cloud. Write down the five important factors which can be the reason behind this fear. Justify each factor being the reason for the ‘No cloud migration’. What approaches can be taken into consideration to resolve such fear.                                                                     [10]

Q.3.        In a system, a single event triggers a sequence of processing steps, each performing a specific function. For example, in an online shopping website where a new order arrives in the system in the form of a message. One requirement may be that the message is encrypted to prevent eavesdroppers from spying on a customer's order. A second requirement is that the messages contain authentication information in the form of a digital certificate to ensure that orders are placed only by trusted customers. In addition, duplicate messages could be sent from external parties. To avoid duplicate shipments and unhappy customers, we need to eliminate duplicate messages before subsequent order processing steps are initiated. To meet these requirements, we need to transform a stream of possibly duplicated, encrypted messages containing extra authentication data into a stream of unique, simple plain-text order messages without the extraneous data fields.

How can we perform complex processing on a message while maintaining independence and flexibility? Explain your approach using an appropriate design pattern. Justify your answer.                              [10]

Q.4.        Assume, ‘Mars’ is online shopping application where various types of customers buy and sell the products of different categories. In order to buy the product, user has to register with this application. After registration process, the basic operations of a buyer are searching for a product, viewing, managing shopping cart and placing order.

Each user is directed to his/her associated bank (where he/she has an account) to make payment. On the other hand, an admin team who manages user’s profile, logs and sessions for smooth purchase experience.

(a)             How will you decompose the entire Mars application into modules as per given description above.                                                                   [3]
(b)             Identify and list out the actors involved in the Mars application.                       [2]
(c)          Identify various use cases involved and represent them via suitable use case diagrams.    [5+15]

***********

No comments:

Post a Comment