Non-Functional Requirement Framework/Attributes
@requirementsquest.com

Non-Functional Requirement Framework/Attributes

Performance

  • Throughput: The ability of the system to execute a given number of transactions within a given unit of time
  • Response times: The allowable distribution of time which the system takes to respond to request

Scalability

  • Throughput: Number of maximum transactions your system needs to handle, for example, thousand a day or A million
  • Storage: Amount of data you going to need to store
  • Growth requirements: Data growth in the next 3-5 years

Availability(Uptime)

  • Availability: Application availability considering the weekends, holidays and maintenance times and failures
  • Locations of operation: Geographic location, Connection requirements and the restrictions of a local network prevail
  • Offline requirement: Time available for offline operations including batch processing and system maintenance
  • Length of time between failures
  • Recoverability: Time required by the system is able to resume operation in the event of failure
  • Resilience: The reliability characteristics of the system and sub-components
  • MTBF : Length of time between failures
  • MTTR : Length of time needed to resume operation after a failure
  • Availability = MTBF/(MTBF+MTTR)

Capacity

  • Throughput: Number of peak transactions the system needs to handle
  • Storage: Volume of data the system will page/persist at runtime to disk. This relates to the memory/disk
  • Year-on-year growth requirements (users, processing and storage)
  • e-channel growth projections
  • Activities or transactions supported for each type of transaction, volumes on an hourly, daily, weekly, monthly and so on
  • Volumes are significantly higher during specific parts of the day (for example, at lunch), week, month or year
  • Transaction volume growth expected and additional volumes you will be able to handle

Security

  • Authentication: Correct identification of parties attempting to access

systems and protection of systems from unauthorized parties

  • Authorization: Mechanism required to authorize users to perform

different functions within the systems

  • Encryption (data in flight and at rest): All external communications

between the system's data server and clients must be encrypted

  • Data confidentiality: All data must be protectively marked, stored and

protected

  • Compliance: The process to confirm systems compliance with the

organizations security standards and policies:

  1. Resistance to known attacks (to be enumerated)
  2. Time/efforts/resources needed to find a key (probability of finding the key)
  3. Probability/time/resources to detect an attack
  4. Percentage of useful services still available during an attack
  5. Percentage of successful attacks
  6. Lifespan of a password, of a session

Maintainability

  • Conformance to design standards, coding standards, best practices, reference architectures and framework
  • Flexibility: The degree to which the system is intended to support change
  • Release Support: The way in which the system will support the introduction of initial release, phased rollouts and future releases:
  • Coupling/cohesion metrics
  • Number of anti-patterns
  • Cyclomatic complexity
  • Mean time to fix a defect
  • Mean time to add new functionality
  • Quality and quantity of documentation

Manageability

  • System must maintain full traceability of transactions
  • Audited objects and audited database fields to be included for auditing
  • File characteristics: size before, size after, structure
  • User and transactional time stamps, and so on
  • Get notices and alerts as thresholds (for example, storage, memory, processor) are approached
  • Remotely manage systems and create new virtual instances at the 'click of a button'
  • Rich graphical dashboard for all key applications metrics

Reliability

  • The ability of a system to perform its required functions under stated conditions for a specific period of time
  • Mean Time Between Failures: Acceptable threshold for down-time
  • Mean Time To Recovery: Time is available to get the system back up online
  • Data integrity: Referential integrity in database tables and interfaces
  • Application integrity and information integrity: During transactions
  • Fault trapping (I/O): Handling failures and recovery
  • Defect rate
  • Degree of precision of computation

Extensibility

  • Handle new information types
  • Manage new or changed business entities
  • Consume or provide new feeds

Recovery

  • Recovery process: Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO)
  • RTO/Restore time: Time required to switch to secondary site when the primary fails
  • RPO/Backup time: Time taken to back your data
  • Backup frequencies: Frequency of backing-up the transaction data, config data and code

Interoperability

  • Compatibility with shared applications: Other systems it need to integrate
  • Compatibility with third party applications: Other systems it has to live with amicably
  • Compatibility on different operating systems: Different OS compatibility
  • Compatibility on different platforms: Hardware platforms it needs to work on

Usability

  • Look and feel standards--screen element density, layout and flow, colours, UI metaphors, keyboard shortcuts
  • Internationalization / localization requirements-- languages, spellings, keyboards, paper sizes, and so on
  • Proportion of functionalities or tasks mastered after a given training time
  • Acceptable response time
  • Number of tasks performed or problems resolved in a given time
  • Number of mouse clicks needed to get to information or functionality
  • Number (or ratio) of learned tasks that can still be performed after not using the system for a given time period
  • Number of error per time period and user class
  • Number of calls to user support
  • Mean time to recover from an error and be able to continue the task
  • Satisfaction ratio per user class and usage ratio

要查看或添加评论,请登录

Rony S.的更多文章

  • What must we have as a Software Architect

    What must we have as a Software Architect

    Software Architect adalah sebuah profesi yang terbilang kurang populer. Tapi, kebutuhan akan Software Architect ini…

  • Kafka Basic Commands

    Kafka Basic Commands

    ====================BASIC KAFKA COMMANDS=================== ===========================================================…

  • Big O - Asymptotic Analysis

    Big O - Asymptotic Analysis

    Hi, kembali lagi bersama saya rony, seorang software engineer yang mempunyai salah satu mimpi untuk dapat menulis buku…

    4 条评论
  • Basic Microservices Architecture Design

    Basic Microservices Architecture Design

    Pada kesempatan kali ini akan sangat menarik karena saya diminta untuk mengisi materi di Telkom University yang…

    3 条评论
  • Chapter 7 - Docker in Continuous Integration & Deployment Practice #Docker-7

    Chapter 7 - Docker in Continuous Integration & Deployment Practice #Docker-7

    Hi all, saya masih setia bersama teman-teman semua untuk mengarungi Docker World. Dan tentu petualangan kita akan…

  • Docker in Software Development Workflow #Docker-6

    Docker in Software Development Workflow #Docker-6

    Yes, kita bertemu lagi di chapter 6 yang semakin seru saja. Semoga semuanya sudah khatam ya dari chapter 1 sampai…

  • Docker Compose in Action #Docker-5

    Docker Compose in Action #Docker-5

    Hi pecinta teknologi dan petani kode. Mari kita tambah lagi pupuk kita tentang Docker agar panen pengetahuan kita…

  • Using Docker in Real Project Application #Docker-4

    Using Docker in Real Project Application #Docker-4

    Halo semuanya, ketemu lagi di chapter 4 dan masih dengan saya, seseorang asli Solo yang kata orang-orang udah hilang…

  • Custom Docker Image #Docker-3

    Custom Docker Image #Docker-3

    Chapter 3 - Custom Docker Image Pada chapter 3 ini kita akan disuguhkan materi mengenai bagaimana kita dapat membuat…

  • Docker Client Interaction #Docker-2

    Docker Client Interaction #Docker-2

    Chapter 2 - Docker Client Interaction Hi Folks, let's get through chapter 2 bersama saya, rony. Semoga kita senantiasa…

    3 条评论

社区洞察

其他会员也浏览了