Skip to main content

Table 2 Techniques [8] selected for the development of software architecture

From: Development and validation of a safe communication protocol compliant to railway standards

Technique

Description

Implementation

Structured methodology

Use of precise and intuitive notation to promote the quality of software development by focusing attention on the early parts of the lifecycle

ODP reference model [17]

Modeling

Use of precise and field-specific graphical formalisms to provide a complete description of the system and its parts

Sequence, state-transition, and structure diagrams

Fully defined interfaces

Complete definition of both internal and external interfaces of each SW module

Detailed description of interfaces for each SW module

Defensive programming

Detect anomalous control flow, data flow, or data values

Acceptance/credibility checks, control flow monitoring

Error detecting codes

Detect errors in sensitive information by, e.g., Hamming, cyclic, or polynomial codes

Cyclic redundancy code

  1. The three columns report respectively the technique name, a brief description of the technique, and the actual technique implementation