Conceptual Domain
Conceptual Domain Viewpoints
The Functional Architecture addresses information needs during the System Requirements Definition process. It focuses on the black box aspects of the system, considering how the system interacts with its environment and the user, without delving into internal details. For example, it translates the intended solution from the Operational Domain into the system’s Functions, defining the expected behavior and quality attributes such as performance, safety, and security. These system behaviors are perceived by the user or external entities at the system boundary (referred to as usage behavior). The outcome of this viewpoint is a comprehensive System Specification, which outlines the required system performance from an external perspective.
The Logical Architecture addresses the information needs during the Architecture Definition process, focusing on the system’s internal structure and how its components interact. It describes the Logical Structure of the System of Interest (SOI) and how responsibilities for system functionality are distributed across a network of interacting Logical Elements. These Logical Elements are tasked with specific functions, and their interactions are arranged in the system’s Logical Architecture. This architecture is often influenced by non-functional criteria, such as maintainability, reliability, safety, and security, ensuring that the system is robust and scalable.
Table of contents
- System Context Definition Viewpoint
- System Context Exchange Viewpoint
- System Use Case Viewpoint
- System Capability Definition Viewpoint
- System Exchange Type Definition Viewpoint
- System Functional Breakdown Structure Viewpoint
- System Structure Definition Viewpoint
- System Functional Refinement Viewpoint
- System Process Viewpoint
- System State Viewpoint
- System Context Interaction Viewpoint
- System Internal Exchange Viewpoint
- System Internal Interaction Viewpoint
- System Interface Definition Viewpoint
- System Requirement Definition Viewpoint
- Asset Identification Viewpoint
- Impact Analysis Viewpoint
- Security Context Viewpoint
- Security Risk Analysis Viewpoint
- Threat Szenario Viewpoint
- System Capability Mapping Viewpoint
- System Function Mapping Viewpoint
- System Requirement Traceability Viewpoint
