SURVEY: DEALING NON-FUNCTIONAL REQUIREMENTS AT ARCHITECTURE LEVEL

Revised April 2016 ABSTRACT. Non-functional requirements (NFRs) are being addressed by the architecture. NFRs are not focused properly as functional requirements (FRs) are dealt and focused. FRs are being taken under consideration at the early stage of software process development (such as architectural level). Usually, the NFRs are being focused at the end of the project, which does not fulfill the desired qualities. Early design decision is very important to achieve a strong connection between design and requirements, quality of a system and a consistent software product. Architecture and NFRs constraint each other therefore, they should be treated together. Runtime NFRs (such as performance, security and fault tolerance) and some of those which are not runtime (such as maintainability) should be considered at the architectural level. This paper presents a survey that emphasizes the integration of NFRs and architectural. We have analyzed the reported techniques on the basis of our evaluation criteria and have presented a comparison.

[1]  Claudia A. López,et al.  Use case-and Scenario-based Approach to Represent NFRs and Architectural Policies , 2005 .

[2]  Xiangjian He,et al.  Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[3]  F. Khan,et al.  Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.

[4]  Lin Liao,et al.  From Requirements to Architecture : The State of the Art in Software Architecture Design , 2002 .

[5]  George R. Ribeiro-Justo,et al.  A framework for building non-functional software architectures , 2001, SAC.

[6]  Xiangjian He,et al.  A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, TrustCom 2015.

[7]  Xiangjian He,et al.  Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.

[8]  Sher Afzal Khan,et al.  Delay and throughput performance improvement in wireless sensor and actor networks , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).

[9]  Leonard J. Bass,et al.  Making Practical Use of Quality Attribute Information , 2008, IEEE Software.

[10]  Jan L. Harrington Denial of Service Attacks , 2005 .

[11]  Kenji Nakagawa,et al.  Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[12]  John Mylopoulos,et al.  Non-Functional Requirements in Software Engineering , 2000, International Series in Software Engineering.

[13]  Mian Ahmad Jan,et al.  A Survey of Cluster-based Hierarchical Routing Protocols , 2013 .

[14]  Francisca Losavio,et al.  Unified Process for Domain Analysis integrating Quality, Aspects and Goals , 2014, CLEI Electron. J..

[15]  Eric Yu,et al.  From Requirements to Architectural Design –Using Goals and Scenarios , 2001 .

[16]  Xavier Franch,et al.  Non-functional Requirements in Architectural Decision Making , 2013, IEEE Software.

[17]  Abdelkrim Haqiq,et al.  Secure Communication and Routing Architecture in Wireless Sensor Networks , 2014 .

[18]  Janne Merilinna,et al.  Extending the NFR Framework with Measurable NonFunctional Requirements , 2009, NFPinDSML@MoDELS.

[19]  P. Inverardi,et al.  A Framework for the Integration of Functional and Non-functional Analysis of Software Architectures , 2005, Electron. Notes Theor. Comput. Sci..

[20]  Shahzad Khan,et al.  Applications, limitations, and improvements in visible light communication systems , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).

[21]  Fahim Arif,et al.  Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[22]  George R. Ribeiro-Justo,et al.  Incorporating Non-functional Requirements into Software Architectures , 2000, IPDPS Workshops.

[23]  Joseph Kasser,et al.  8.5.3 A Framework for a Systems Engineering Body of Knowledge , 2001 .

[24]  David C. Brown,et al.  NFRs: Fact or Fiction , 2002 .

[25]  Pentti Tarvainen,et al.  Adaptability Evaluation at Software Architecture Level , 2008 .

[26]  Xiangjian He,et al.  A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[27]  Mara Nikolaidou,et al.  Classification and Qualitative Analysis of Non-Functional Requirements Approaches , 2014, BMMDS/EMMSAD.

[28]  Jane Cleland-Huang,et al.  Toward improved traceability of non-functional requirements , 2005, TEFSE '05.

[29]  Barbara Paech,et al.  An Experience-Based Approach for Integrating Architecture and Requirements Engineering , 2003, STRAW.

[30]  Liming Zhu,et al.  UML Profiles for Design Decisions and Non-Functional Requirements , 2007, Second Workshop on Sharing and Reusing Architectural Knowledge - Architecture, Rationale, and Design Intent (SHARK/ADI'07: ICSE Workshops 2007).

[31]  Harsimran Kaur NFR‟s: Definition , 2015 .

[32]  Xiangjian He,et al.  PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.

[33]  Nenad Medvidovic,et al.  Reconciling software requirements and architectures: the CBSP approach , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.

[34]  Julio Cesar Sampaio do Prado Leite,et al.  On Non-Functional Requirements in Software Engineering , 2009, Conceptual Modeling: Foundations and Applications.