{"id":25755,"date":"2023-04-22T16:38:45","date_gmt":"2023-04-22T08:38:45","guid":{"rendered":"https:\/\/docs.pingcode.com\/?p=25755"},"modified":"2023-07-30T23:26:47","modified_gmt":"2023-07-30T15:26:47","slug":"aspice%e4%b8%ad%e6%8f%90%e5%88%b0%e7%9a%84%e7%b3%bb%e7%bb%9f%e6%9e%b6%e6%9e%84%e8%ae%be%e8%ae%a1%ef%bc%8c%e4%b8%80%e8%88%ac%e7%94%a8%e4%bb%80%e4%b9%88%e5%b7%a5%e5%85%b7","status":"publish","type":"post","link":"https:\/\/docs.pingcode.com\/ask\/25755.html","title":{"rendered":"aspice\u4e2d\u63d0\u5230\u7684\u7cfb\u7edf\u67b6\u6784\u8bbe\u8ba1\uff0c\u4e00\u822c\u7528\u4ec0\u4e48\u5de5\u5177"},"content":{"rendered":"<blockquote class=\"wp-block-quote\">\n<p>aspice\u4e2d\u63d0\u5230\u7684\u7cfb\u7edf\u67b6\u6784\u8bbe\u8ba1\uff0c\u8fd9\u4e2a\u53ef\u80fd\u8fd8\u8981\u7ed3\u5408\u5177\u4f53\u7684\u4ea7\u54c1\u6765\u770b\uff0c\u6bd4\u5982\u8bf4\u6709\u4e9b\u53ef\u4ee5\u7528UML \u5de5\u5177\u6765\u8bbe\u8ba1\u67b6\u6784\u56fe\uff0c \u4e5f\u53ef\u4ee5\u7528Enterprise Archit\u7b49\u5de5\u5177\uff0c \u8fd8\u53ef\u4ee5\u7528MATLAB\u3002ASPICE\u662f\u4e00\u5957\u5bf9\u9879\u76ee\u8d28\u91cf\u8981\u6c42\u5f88\u9ad8\u7684\u4f53\u7cfb\uff0c\u5176\u4e3b\u5e72\u57fa\u672c\u8986\u76d6\u4e86\u6c7d\u8f66\u7535\u5b50\u7814\u53d1\u9879\u76ee\u7684\u6240\u6709\u4e3b\u8981\u8fc7\u7a0b\u3002<\/p>\n<\/blockquote>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" alt=\"\" class=\"wp-image-25756\" decoding=\"async\" height=\"421\" sizes=\"(max-width: 680px) 100vw, 680px\" src=\"https:\/\/cdn-docs.pingcode.com\/wp-content\/uploads\/2023\/04\/\u6dfb\u52a0\u6807\u9898-21-3.png?x-oss-process=image\/auto-orient,1\/format,webp\" srcset=\"https:\/\/cdn-docs.pingcode.com\/wp-content\/uploads\/2023\/04\/\u6dfb\u52a0\u6807\u9898-21-3.png?x-oss-process=image\/auto-orient,1\/format,webp 680w, https:\/\/cdn-docs.pingcode.com\/wp-content\/uploads\/2023\/04\/\u6dfb\u52a0\u6807\u9898-21-3-300x186.png 300w\" width=\"680\"\/><\/figure>\n<\/div>\n<h2 class=\"wp-block-heading\"><strong>\u4e00\u3001aspice\u4e2d\u7684\u7cfb\u7edf\u67b6\u6784\u8bbe\u8ba1<\/strong><\/h2>\n<p>aspice\u4e2d\u63d0\u5230\u7684\u7cfb\u7edf\u67b6\u6784\u8bbe\u8ba1\uff0c\u8fd9\u4e2a\u53ef\u80fd\u8fd8\u8981\u7ed3\u5408\u5177\u4f53\u7684\u4ea7\u54c1\u6765\u770b\uff0c\u6bd4\u5982\u8bf4\u6709\u4e9b\u53ef\u4ee5\u7528UML \u5de5\u5177\u6765\u8bbe\u8ba1\u67b6\u6784\u56fe\uff0c \u4e5f\u53ef\u4ee5\u7528Enterprise Archit\u7b49\u5de5\u5177\uff0c \u8fd8\u53ef\u4ee5\u7528MATLAB\u3002ASPICE\u662f\u4e00\u5957\u5bf9\u9879\u76ee\u8d28\u91cf\u8981\u6c42\u5f88\u9ad8\u7684\u4f53\u7cfb\uff0c\u5176\u4e3b\u5e72\u57fa\u672c\u8986\u76d6\u4e86\u6c7d\u8f66\u7535\u5b50\u7814\u53d1\u9879\u76ee\u7684\u6240\u6709\u4e3b\u8981\u8fc7\u7a0b\u3002<\/p>\n<p>\u7cfb\u7edf\u67b6\u6784\u8bbe\u8ba1\u8fc7\u7a0b\u5305\u62ec\u4e09\u4e2a\u6b65\u9aa4\uff1a<\/p>\n<p>1.\u5efa\u7acb\u4e00\u4e2a\u7cfb\u7edf\u67b6\u6784\u8bbe\u8ba1(establish a system architectural design)<\/p>\n<p>2.\u5206\u914d\u7cfb\u7edf\u9700\u6c42\u5230\u7cfb\u7edf\u67b6\u6784\u8bbe\u8ba1\u7684\u5bf9\u5e94\u5143\u7d20\u4e2d(identify which system requirements are to be allocated to which elements of the system)<\/p>\n<p>3.\u5bf9\u7cfb\u7edf\u67b6\u6784\u8fdb\u884c\u8bc4\u4f30(evaluate the system architectural design against defined criteria)<\/p>\n<p>\u7cfb\u7edf\u67b6\u6784(system architectural)<\/p>\n<p>\u53ef\u4ee5\u7406\u89e3\u4e3a\u5bf9\u4e00\u4e2a\u63cf\u8ff0\u4e86\u5916\u7279\u6027\u7684\u4e8b\u7269\u8fdb\u884c\u5408\u7406\u7684\u62c6\u5206\uff0c\u62c6\u5206\u6210\u591a\u79cd\u5143\u7d20\u3002<\/p>\n<p>\u5bf9\u590d\u6742\u7684\u7cfb\u7edf\u53ef\u4ee5\u5728\u591a\u4e2a\u5c42\u7ea7\u4e0a\u8fdb\u884c\u62c6\u5206\u3002<\/p>\n<p>\u5982\u5c0f\u533a\u662f\u57ce\u5e02\u7684\u4e00\u4e2a\u5143\u7d20\uff0c\u697c\u623f\u662f\u5c0f\u533a\u7684\u4e00\u4e2a\u5143\u7d20\uff0c\u4f4f\u6237\u662f\u697c\u623f\u7684\u4e00\u4e2a\u5143\u7d20\uff0c\u536b\u751f\u95f4\u662f\u4f4f\u6237\u7684\u4e00\u4e2a\u5143\u7d20\u2026<\/p>\n<p>\u6211\u4eec\u5f80\u5f80\u4e0d\u4f1a\u5728\u8bbe\u8ba1\u57ce\u5e02\u65f6\u5c31\u628a\u536b\u751f\u95f4\u8bbe\u8ba1\u51fa\u6765\uff0c\u4f46\u662f\u8bbe\u8ba1\u4ea7\u54c1\u65f6\u5374\u7ecf\u5e38\u5728\u5927\u7684\u67b6\u6784\u8fd8\u6ca1\u6709\u786e\u5b9a\u7684\u60c5\u51b5\u4e0b\u53bb\u7ea0\u7ed3\u66f4\u4f4e\u5c42\u7ea7\u7684\u5143\u7d20\u3002<\/p>\n<p>\u4f53\u7cfb\u8ba4\u8bc1\uff1a\u81f3\u5c11\u5e94\u8fdb\u884c\u4e00\u6b21\u5206\u5c42\u8bbe\u8ba1\uff0c\u4ee5\u4f53\u73b0\u8be5\u8fc7\u7a0b\u88ab\u6267\u884c\u3002<\/p>\n<p>\u7cfb\u7edf\u9700\u6c42\u662f\u5bf9\u5916\u7279\u6027\uff08\u529f\u80fd\u548c\u6027\u80fd\uff09\uff0c\u7cfb\u7edf\u67b6\u6784\u662f\u5bf9\u7cfb\u7edf\u9700\u6c42\u7684\u5185\u5728\u8fdb\u884c\u7ec6\u8282\u5316\u3002<\/p>\n<p>\u7b80\u5355\u7684\u7cfb\u7edf\u53ef\u80fd\u53ea\u6709\u4e00\u4e2a\u5143\u7d20\u5c42\u7ea7<\/p>\n<p>\u590d\u6742\u7684\u7cfb\u7edf\u9700\u8981\u57fa\u4e8e\u67d0\u79cd\u6807\u51c6\u8fdb\u884c\u591a\u4e2a\u5c42\u7ea7\u7684\u5143\u7d20\u62c6\u5206<\/p>\n<p><strong>SYS.3.BP2: Allocate system requirements.<\/strong><\/p>\n<p>Allocate the system requirements to the elements of the system architectural design.<\/p>\n<p>\u5c06\u7cfb\u7edf\u9700\u6c42\u5206\u914d\u5230\u5bf9\u5e94\u7684\u7cfb\u7edf\u5143\u7d20\u4e2d\u3002<\/p>\n<p>\u4f53\u7cfb\u8ba4\u8bc1\uff1a\u8981\u786e\u4fdd\u5206\u914d\u9700\u6c42\u548c\u5143\u7d20\u6709\u53cc\u5411\u8ffd\u6eaf\u5173\u7cfb\u3002<\/p>\n<p>\u9879\u76ee\u5b9e\u8df5\uff1a\u7cfb\u7edf\u5143\u7d20\u548c\u7cfb\u7edf\u9700\u6c42\u7edd\u5bf9\u4e0d\u662f\u4e00\u4e00\u5bf9\u5e94\u7684\u5173\u7cfb\uff0c\u67d0\u4e2a\u7cfb\u7edf\u9700\u6c42\u53ef\u80fd\u9700\u8981\u7cfb\u7edf\u7684\u591a\u4e2a\u5143\u7d20\uff0c\u7cfb\u7edf\u7684\u67d0\u4e2a\u5143\u7d20\u53ef\u80fd\u4f1a\u5b9e\u73b0\u7cfb\u7edf\u9700\u6c42\u4e2d\u7684\u591a\u4e2a\u9700\u6c42\u3002<\/p>\n<p>\u6bcf\u4e2a\u5efa\u7b51\u5e08\u90fd\u5e0c\u671b\u81ea\u5df1\u80fd\u8bbe\u8ba1\u4e00\u5ea7\u5343\u5e74\u4e0d\u5012\u7684\u5efa\u7b51\uff0c\u6bcf\u4e2a\u8f6f\u4ef6\u5de5\u7a0b\u5e08\u4e5f\u90fd\u5e0c\u671b\u81ea\u5df1\u7684\u67b6\u6784\u53ef\u4ee5\u5c3d\u53ef\u80fd\u7684\u5ef6\u957f\u5bff\u547d\u3002<\/p>\n<p>\u7b14\u8005\u66fe\u5c31\u804c\u4e8e\u534e\u4e3a\u7684\u7f51\u7edc\u90e8\u95e8\u4ece\u4e8bC++\u540e\u53f0\u5f00\u53d1\uff0c2009\u5e74\u8f6c\u884c\u505a\u4e86\u5d4c\u5165\u5f0f\uff0c\u4e8e\u662f\u628a\u5f53\u65f6WEB\u67b6\u6784\u7684\u601d\u8def\u5f15\u5165\u5230\u5d4c\u5165\u5f0f\u4ea7\u54c1\u4e2d\uff0c\u867d\u713610\u5e74\u6765\u516c\u53f8\u4ea7\u54c1\u9700\u6c42\u4e0d\u65ad\u53d8\u5316\uff0c\u786c\u4ef6\u4e0d\u65ad\u66f4\u65b0\u6362\u4ee3\uff0c\u4f46\u662f\u8fd9\u5957\u67b6\u6784\u7684\u5e95\u5c42\u4ee3\u7801\u4e00\u76f4\u670d\u5f79\u5230\u73b0\u5728\u3002\u6bd5\u7adf\u5d4c\u5165\u5f0f\u4ea7\u54c1\u7cfb\u7edf\u518d\u590d\u6742\uff0c\u529f\u80fd\u518d\u7e41\u591a\u4e5f\u591a\u4e0d\u8fc7\u4e92\u8054\u7f51\u3002<\/p>\n<p>\u5c31\u50cf\u867d\u7136\u7f51\u7edc\u5e94\u7528\u4e5f\u90fd\u5230\u624b\u673aAPP\u4e0a\u4e86\uff0c\u7269\u8054\u7f51\u4e5f\u5174\u8d77\u4e86\uff0c5G\u8f6c\u773c\u5c31\u666e\u53ca\u4e86\uff0c\u4f46\u662fTCP\/IP\u8fd8\u4f9d\u7136\u5728\u7528\u3002<\/p>\n<p>\u7cfb\u7edf\u6027\u7684\u5b9e\u4f53\u4ea7\u54c1\uff0c\u5927\u5230\u98de\u673a\u6c7d\u8f66\uff0c\u5c0f\u5230\u4e00\u7247\u5355\u7247\u673a\uff0c\u90fd\u9003\u4e0d\u6389\u603b\u7ebf\u8fd9\u79cd\u67b6\u6784\u3002<\/p>\n<p><strong>SYS.3.BP3: Define interfaces of system elements.<\/strong><\/p>\n<p>Identify, develop and document the interfaces of each system element.<\/p>\n<p>\u7ed9\u6bcf\u4e2a\u5143\u7d20\u8bbe\u8ba1\u63a5\u53e3\uff0c\u5c31\u7b49\u540c\u4e8e\u628a\u5143\u7d20\u5f53\u6210\u4e00\u4e2a\u9700\u8981\u5206\u6790\u7684\u7cfb\u7edf\uff08\u53c2\u7167\u7cfb\u7edf\u9700\u6c42\u5206\u6790\uff09\uff0c\u63cf\u8ff0\u5143\u7d20\u5916\u7279\u6027\u3002<\/p>\n<p><strong>SYS.3.BP4: Describe dynamic behavior.<\/strong><\/p>\n<p>Evaluate and document the dynamic behavior of the interaction between system elements.<\/p>\n<p><em>NOTE 2: Dynamic behavior is determined by operating modes (e.g. start-up, shutdown, normal mode, calibration, diagnosis, etc.).<\/em><\/p>\n<p>\u4e3a\u6bcf\u4e2a\u5143\u7d20\u8bbe\u8ba1\u597d\u81ea\u5df1\u7684\u5916\u7279\u6027\u540e\uff08\u53ef\u4ee5\u79f0\u4e4b\u4e3a\u9759\u6001\u63cf\u8ff0\uff09\uff0c\u8981\u63cf\u8ff0\u5143\u7d20\u4e4b\u95f4\u7684\u201c\u52a8\u6001\u884c\u4e3a\u201d\uff0c\u4e5f\u53ef\u4ee5\u8bf4\u8fd9\u4e9b\u5143\u7d20\u662f\u5982\u4f55\u76f8\u4e92\u914d\u5408\u5b8c\u6210\u529f\u80fd\u7684\u3002<\/p>\n<p>\u4e3e\u4e2a\u4f8b\u5b50\uff1a<\/p>\n<p>\u5de5\u4eba\u4eec\u8981\u5efa\u7acb\u4e00\u6761\u751f\u4ea7\u7ebf\uff0c\u9664\u4e86\u8981\u89c4\u5b9a\u6bcf\u4e2a\u5de5\u4eba\u8981\u627f\u62c5\u7684\u5de5\u4f5c\u4e4b\u5916\uff0c\u8fd8\u8981\u89c4\u5b9a\u8fd9\u4e9b\u5de5\u4eba\u4e4b\u95f4\u6309\u7167\u4ec0\u4e48\u65b9\u5f0f\u8fdb\u884c\u534f\u4f5c\uff0c\u6bd4\u5982\u751f\u4ea7\u7ebf\u7684\u5de5\u4f5c\u987a\u5e8f\u662f\u4ec0\u4e48\u6837\u7684\uff0c\u600e\u4e48\u5f00\u59cb\uff0c\u600e\u4e48\u7ed3\u675f\uff0c\u7279\u6b8a\u60c5\u51b5\u5982\u4f55\u5904\u7406\uff0c\u6709\u95ee\u9898\u5982\u4f55\u4e0a\u62a5\u7b49\u7b49\u3002<\/p>\n<p>\u9898\u5916\u8bdd\uff0c\u5f88\u591a\u7ba1\u7406\u8005\u5728\u5de5\u4f5c\u4e2d\u53ea\u8bbe\u8ba1\u5458\u5de5\u7684\u5bf9\u5916\u63a5\u53e3\uff0c\u4e0d\u8003\u8651\u5458\u5de5\u4e4b\u95f4\u7684\u5de5\u4f5c\u6d41\u7a0b\uff0c\u5c31\u4f1a\u5bfc\u81f4\u5458\u5de5\u4e4b\u95f4\u5408\u4f5c\u969c\u788d\uff0c\u4ece\u800c\u8ba9\u7ec4\u7ec7\u7684\u6548\u7387\u4f4e\u4e0b\u3002<\/p>\n<p>\u4f53\u7cfb\u8ba4\u8bc1\uff1a\u81f3\u5c11\u8981\u628astart-up, shutdown, normal mode, calibration, diagnosis,\u8fd9\u4e9b\u5305\u542b\u5230\u52a8\u6001\u884c\u4e3a\u4e2d\u3002<\/p>\n<p><strong>SYS.3.BP5: Evaluate alternative system architectures.<\/strong><\/p>\n<p>Define evaluation criteria for the architecture. Evaluate alternative system architectures according to the defined criteria. Record the rationale for the chosen system architecture.<\/p>\n<p><em>NOTE 3: Evaluation criteria may include quality characteristics (modularity,maintainability, expandability, scalability, reliability, security realization and usability) and results of make-buy-reuse analysis.<\/em><\/p>\n<p>\u4f53\u7cfb\u8ba4\u8bc1\uff1a\u81f3\u5c11\u8981\u5236\u5b9a\u548cNOTE3\u4e00\u81f4\u7684\u8bc4\u4f30\u51c6\u5219\u3002<\/p>\n<p>\u9879\u76ee\u5b9e\u8df5\uff1a\u5728\u5b9e\u8df5\u8fc7\u7a0b\u4e2d\uff0cNOTE3\u7684\u6a21\u5757\u6027\u3001\u53ef\u7ef4\u62a4\u6027\u3001\u53ef\u6269\u5c55\u6027\u3001\u53ef\u6269\u7f29\u6027\u3001 \u53ef\u9760\u6027\u3001\u5b89\u5168\uff08security\uff09\u53ef\u5b9e\u73b0\u6027\u3001\u6613\u7528\u6027\u8fd9\u4e9b\u65b9\u9762\u90fd\u5e94\u8be5\u88ab\u8003\u8651\u5728\u5185\u3002<\/p>\n<p>\u57fa\u4e8e\u4ee5\u4e0a\u5185\u5bb9\u7684\u8bc4\u4f30\u6a21\u677f\u4e5f\u5e94\u8be5\u6210\u4e3a\u516c\u53f8\u7684\u6280\u672f\u8bc4\u4f30\u6a21\u677f\u4e4b\u4e00\u3002<\/p>\n<p><strong>SYS.3.BP6: Establish bidirectional traceability.<\/strong><\/p>\n<p>Establish bidirectional traceability between system requirements and elements of the system architectural design.<\/p>\n<p><em>NOTE 4: Bidirectional traceability covers allocation of system requirements to the elements of the system architectural design.<\/em><\/p>\n<p><em>NOTE 5: Bidirectional traceability supports coverage, consistency and impact analysis.<\/em><\/p>\n<p>\u4f53\u7cfb\u8ba4\u8bc1\uff1a<\/p>\n<p>1.\u516c\u53f8\u4f53\u7cfb\u6587\u4ef6\u4e2d\u8981\u5bf9\u7cfb\u7edf\u9700\u6c42\u7684\u53ef\u8ffd\u6eaf\u6027\u8fc7\u7a0b\u8fdb\u884c\u6307\u5bfc\u3002\uff08\u5df2\u5b9a\u4e49\uff09<\/p>\n<p>2.\u5fc5\u987b\u6709\u4e00\u79cd\u80fd\u591f\u53ef\u8ffd\u6eaf\u7684<a href=\"https:\/\/docs.pingcode.com\/requirements-management-guide\" target=\"_blank\">\u9700\u6c42\u7ba1\u7406<\/a>\u5de5\u5177\uff0c\u5982DOORS\uff0c\u5426\u5219\u51e0\u4e4e\u65e0\u6cd5\u901a\u8fc7\u8ba4\u8bc1\u3002\uff08\u5df2\u6267\u884c\uff09<\/p>\n<p>3.\u8986\u76d6\u7387\u3001 \u4e00\u81f4\u6027\u548c\u5f71\u54cd\u5206\u6790\uff08coverage, consistency and impact analysis\uff09\u9700\u8981\u6709<\/p>\n<p>\u9879\u76ee\u5b9e\u8df5\uff1a<\/p>\n<p>\u4ee5\u4e0b\u5404\u4e2a\u73af\u8282\u90fd\u5fc5\u987b\u5efa\u7acb\u53cc\u5411\u8ffd\u6eaf\uff0c\u4ee5\u786e\u4fdd\u4ea7\u54c1\u7684\u7814\u53d1\u8fc7\u7a0b\u6ca1\u6709\u53d1\u751f\u504f\u5dee\u3002<\/p>\n<p>\u7528\u6237\u9700\u6c42\u2013\u7cfb\u7edf\u9700\u6c42\u2013\u7cfb\u7edf\u67b6\u6784\u2013\uff08\u786c\u4ef6\u8fc7\u7a0b\u7565\uff09\u2013\u8f6f\u4ef6\u9700\u6c42\u2013\u8f6f\u4ef6\u67b6\u6784\u2013\u8f6f\u4ef6\u5355\u5143\u2013\u5355\u5143\u6d4b\u8bd5\u7528\u4f8b\u2013\u8f6f\u4ef6\u96c6\u6210\u6d4b\u8bd5\u7528\u4f8b\u2013\u8f6f\u4ef6\u6d4b\u8bd5\u7528\u4f8b\u2013\u7cfb\u7edf\u96c6\u6210\u7528\u4f8b\u2013\u7cfb\u7edf\u6d4b\u8bd5\u7528\u4f8b<\/p>\n<p>\u53cc\u5411\u8ffd\u6eaf\u7684\u5de5\u5177\u53ef\u53c2\u8003MATLAB\u3002<\/p>\n<p><strong>SYS.3.BP7: Ensure consistency.\u00a0<\/strong>Ensure consistency between system requirements and the system architectural design.<\/p>\n<p><em>NOTE 6: Consistency is supported by bidirectional traceability and can be demonstrated by review records.<\/em><\/p>\n<p><em>NOTE 7: System requirements typically include system architectural requirements. Refer to BP5.<\/em><\/p>\n<p>\u4f53\u7cfb\u8ba4\u8bc1\uff1a<\/p>\n<p>1.\u516c\u53f8\u4f53\u7cfb\u6587\u4ef6\u4e2d\u8981\u5bf9\u53cc\u5411\u53ef\u8ffd\u6eaf\u6027\u7684\u8bc4\u5ba1\u8fc7\u7a0b\u8fdb\u884c\u6307\u5bfc\u3002\uff08\u5df2\u5b9a\u4e49\uff09<\/p>\n<p>2.\u5fc5\u987b\u6709\u786e\u8ba4\u53cc\u5411\u53ef\u8ffd\u6eaf\u6027\u7684\u8bc4\u5ba1\u8bb0\u5f55\u3002\uff08\u5df2\u6267\u884c\uff09<\/p>\n<p>\u9879\u76ee\u5b9e\u8df5\uff1a<\/p>\n<p>\u6bcf\u4e2a\u9700\u8981\u786e\u8ba4\u7684\u73af\u8282\u90fd\u5fc5\u987b\u8fdb\u884c\u8bc4\u5ba1\uff0c\u4ee5\u4fdd\u8bc1\u7ed3\u8bba\u7684\u51c6\u786e\u6027\u3002<\/p>\n<p>\u901a\u8fc7\u8bc4\u5ba1\u6765\u89c4\u907f\u4e2a\u4eba\u7ecf\u9a8c\u7684\u4e0d\u8db3\u3002<\/p>\n<p>\u901a\u8fc7\u8bc4\u5ba1\u6765\u89c4\u907f\u8ba9\u4e2a\u4eba\u627f\u62c5\u91cd\u5927\u8d23\u4efb\u7684\u60c5\u51b5\u3002<\/p>\n<p><strong>SYS.3.BP8: Communicate agreed system architectural design.<\/strong><\/p>\n<p>Communicate the agreed system architectural design and updates to system architectural design to all relevant parties.<\/p>\n<p>\u4f53\u7cfb\u8ba4\u8bc1\uff1a<\/p>\n<p>1.\u516c\u53f8\u4f53\u7cfb\u6587\u4ef6\u4e2d\u8981\u5bf9\u9636\u6bb5\u6027\u4ea7\u7269\u7684\u6c9f\u901a\u8303\u56f4\u8fdb\u884c\u8981\u6c42\u3002\uff08\u5df2\u5b9a\u4e49\uff09<\/p>\n<p>2.\u5fc5\u987b\u6709\u4e0e\u76f8\u5173\u90e8\u95e8\u6c9f\u901a\u7684\u8bb0\u5f55\u3002\uff08\u5df2\u6267\u884c\uff09<\/p>\n<p>\u9879\u76ee\u5b9e\u8df5\uff1a<\/p>\n<p>\u62ff\u5230\u5404\u4e2a\u76f8\u5173\u90e8\u95e8\u5bf9\u9879\u76ee\u9636\u6bb5\u6027\u4ea7\u7269\u7684\u8ba4\u53ef\uff0c\u53ef\u4ee5\u6709\u6548\u660e\u786e\u5404\u65b9\u8d23\u4efb\uff0c\u907f\u514d\u65e5\u540e\u4ea7\u751f\u626f\u76ae\u7684\u60c5\u51b5\u3002<\/p>\n<p>\u9879\u76ee\u7684\u53d8\u66f4\uff0c\u66f4\u662f\u8981\u5f97\u5230\u76f8\u5173\u65b9\u7684\u8ba4\u53ef\u3002<\/p>\n<p>As a result of successful implementation of this process:<\/p>\n<p>1) a system architectural design is defined that identifies the elements of the system;<\/p>\n<p>2) the system requirements are allocated to the elements of the system;<\/p>\n<p>3) the interfaces of each system element are defined;<\/p>\n<p>4) the dynamic behavior of the system elements is defined;<\/p>\n<p>5) consistency and bidirectional traceability are established between system requirements and system architectural design; and<\/p>\n<p>6) the system architectural design is agreed and communicated to all affected parties.<\/p>\n<p><strong>\u5ef6\u4f38\u9605\u8bfb\uff1a<\/strong><\/p>\n<h2 class=\"wp-block-heading\"><strong>\u4e8c\u3001\u7cfb\u7edf\u7ec4\u4ef6\u548c\u63a5\u53e3\u63a7\u5236\u8bc4\u4f30\u7684\u5185\u5bb9<\/strong><\/h2>\n<p>\u5728\u7814\u7a76\u548c\u7406\u89e3\u7cfb\u7edf\u9700\u6c42\u540e\uff0c\u8fdb\u884c\u7cfb\u7edf\u67b6\u6784\u8bbe\u8ba1\u65f6\uff0c\u5373\u9996\u5148\u4f1a\u8fdb\u884c\u6a21\u5757\u5212\u5206\uff0c\u5728\u6574\u4f53\u67b6\u6784\u5c42\u7ea7\uff0c\u4f1a\u6709\u7ed3\u6784\u3001\u786c\u4ef6\u3001\u8f6f\u4ef6\u7684\u533a\u5206\uff0c\u800c\u540e\u8fdb\u884c\u7cfb\u7edf\u9700\u6c42\u7684\u5206\u914d\u3002\u4e0d\u540c\u7684\u8bbe\u8ba1\u65b9\u6848\u5fc5\u7136\u5f71\u54cd\u7cfb\u7edf\u7ec4\u4ef6\u4ee5\u53ca\u63a5\u53e3\u5904\u7406\u3002\u5728\u8fd9\u91cc\u4e3b\u8981\u8003\u8651\u4e24\u65b9\u9762\uff0c\u4e00\u662f\u7cfb\u7edf\u7ec4\u4ef6\u6570\u91cf\uff0c\u4e8c\u662f\u63a5\u53e3\u3002\u201c\u4f4e\u8026\u5408\u9ad8\u5185\u805a\u201d\u4e0d\u4ec5\u662f\u8f6f\u4ef6\u67b6\u6784\u8bbe\u8ba1\u4e2d\u8981\u575a\u6301\u7684\u8bbe\u8ba1\u601d\u60f3\uff0c\u540c\u6837\u5728\u7cfb\u7edf\u67b6\u6784\u8bbe\u8ba1\u4e2d\u4e5f\u8981\u8003\u8651\uff0c\u5b9e\u73b0\u8f6f\u4ef6\u3001\u786c\u4ef6\u53ca\u7ed3\u6784\u7684\u5b8c\u5168\u89e3\u8026\uff0c\u8fd9\u5bf9\u4e8e\u7cfb\u7edf\u548c\u540e\u7eed\u8f6f\u4ef6\u5f00\u53d1\u5de5\u4f5c\u5341\u5206\u6709\u5229\u3002<\/p>\n<p>\u8f6f\u4ef6\u7a0b\u5e8f\u5c3d\u91cf\u4e0e\u786c\u4ef6\u9a71\u52a8\u5206\u79bb\uff0c\u540c\u65f6\u9488\u5bf9\u8f6f\u4ef6\u6a21\u5757\uff0c\u786c\u4ef6\u6a21\u5757\u4e5f\u8981\u6839\u636e\u529f\u80fd\u573a\u666f\uff0c\u5b9e\u73b0\u9ad8\u5ea6\u6a21\u5757\u5316\u3002\u63a5\u53e3\u6570\u91cf\u5f62\u5f0f\u8ddf\u6a21\u5757\u5212\u5206\u7684\u6570\u91cf\u53ca\u529f\u80fd\u590d\u6742\u5ea6\u5bc6\u5207\u76f8\u5173\u3002\u52a1\u5fc5\u8ffd\u6c42\u6a21\u5757\u6570\u91cf\u5206\u914d\u5408\u7406\u3001\u63a5\u53e3\u6570\u91cf\u53ca\u5f62\u5f0f\u5206\u914d\u5408\u7406\u3001\u6a21\u5757\u5b9e\u73b0\u529f\u80fd\u660e\u786e\u4e14\u9ad8\u5ea6\u96c6\u6210\u7684\u539f\u5219\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"aspice\u4e2d\u63d0\u5230\u7684\u7cfb\u7edf\u67b6\u6784\u8bbe\u8ba1\uff0c\u8fd9\u4e2a\u53ef\u80fd\u8fd8\u8981\u7ed3\u5408\u5177\u4f53\u7684\u4ea7\u54c1\u6765\u770b\uff0c\u6bd4\u5982\u8bf4\u6709\u4e9b\u53ef\u4ee5\u7528UML \u5de5\u5177\u6765\u8bbe\u8ba1\u67b6\u6784\u56fe\uff0c [&hellip;]","protected":false},"author":1,"featured_media":25756,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/docs.pingcode.com\/wp-json\/wp\/v2\/posts\/25755"}],"collection":[{"href":"https:\/\/docs.pingcode.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/docs.pingcode.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/docs.pingcode.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/docs.pingcode.com\/wp-json\/wp\/v2\/comments?post=25755"}],"version-history":[{"count":0,"href":"https:\/\/docs.pingcode.com\/wp-json\/wp\/v2\/posts\/25755\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/docs.pingcode.com\/wp-json\/wp\/v2\/media\/25756"}],"wp:attachment":[{"href":"https:\/\/docs.pingcode.com\/wp-json\/wp\/v2\/media?parent=25755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/docs.pingcode.com\/wp-json\/wp\/v2\/categories?post=25755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/docs.pingcode.com\/wp-json\/wp\/v2\/tags?post=25755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}