1.1. Introduction
1.2. Design Considerations
1.2.1. Decision Overview
< Describe the system design in broad terms . Consider benefits, costs and schedule and technical risks. Describe how the proposed solution aligns with the enterprise architecture. >
1.2.2. Other Considerations (DAR)
<Alternative designs considered and why one was chosen>
1.3. Architecture
1.3.1. Layout
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
1.3.2. Communication
<Describe the communication between the sub-systems. (Diagrams may be used to illustrate communications). >
1.4.1. Build Trigger and Generation
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
1.4.2. Build VM Deploy and Sanity Test Execution
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
1.4.3. Report Management
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
< Identify input interfaces, function call protocol, and the nature of the data structures passed across the interface between the sub-modules>
< Identify output interfaces, function call protocol, and the nature of the data structures passed across the interface. >
1.5. Data Model
<Provide a description of the data model>
1.6. Limitations
< Describe the cases that are identified as problem but unable to report to it due to various factors. Describe the factors >
1.7. Future Enhancements
< Describe how the current design is suitable for future enhancement without completely modifying existing design . >