Skip to main content

Posts

Showing posts from February, 2019

Principles of Computer Systems and Network Management

2.3 Planning to Satisfy Requirements The exercise serves to enumerate all the potential attacks and exposes the set of potential threats against which no appropriate plans exist . The techniques described in the previous sections can be used to determine the different attributes of a computer system plan that shows the set of component s and their interconnection . The problem of finding a computer system plan that is the best one to meet a given set of requirements is harder than the reverse problem. In some cases, it can even be shown that determining the best plan is NP complete. To make matters worse, one set of requirements may be conflicting with another set (e.g., cost, performance, and security requirements often conflict with each other) .        In many cases, some of the steps may be obvious from the requirement specifications while other steps (or part of a step) may require significant investigation. When a wide area network is desi...