Skip to main content

Table 2 Techniques [8] selected for the development of software architecture

From: Development and validation of a safe communication protocol compliant to railway standards

Technique Description Implementation
Structured methodology Use of precise and intuitive notation to promote the quality of software development by focusing attention on the early parts of the lifecycle ODP reference model [17]
Modeling Use of precise and field-specific graphical formalisms to provide a complete description of the system and its parts Sequence, state-transition, and structure diagrams
Fully defined interfaces Complete definition of both internal and external interfaces of each SW module Detailed description of interfaces for each SW module
Defensive programming Detect anomalous control flow, data flow, or data values Acceptance/credibility checks, control flow monitoring
Error detecting codes Detect errors in sensitive information by, e.g., Hamming, cyclic, or polynomial codes Cyclic redundancy code
  1. The three columns report respectively the technique name, a brief description of the technique, and the actual technique implementation