22
• Software Architecture • April-10 Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level • Software Architecture • April-10 Click to edit Master text styles Second level Third level Fourth level Fifth level 1 Application Standard Development [email protected]

Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Embed Size (px)

Citation preview

Page 1: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

• Software Architecture • April-10 Confidential Proprietary

Click to edit Master text styles

Second levelThird level

Fourth level

Fifth level • Software Architecture • April-10

Click to edit Master text styles

Second levelThird level

Fourth level

Fifth level 1

Application Standard Development

[email protected]

Page 2: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Table of Contents• Pattern

• Tiered Approach

• Concept Traceability

• Software Automation

• Development Pattern

• Architecture Approach

Page 3: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

What’s Pattern in Computer Science?

• Each pattern is a three-part rule, which expresses a relation between a certain context, a problem, and a solution.

—Christopher Alexander

• Each pattern is a three-part rule, which expresses a relation between a certain context, a certain system of forces which occurs repeatedly in that context, and a certain software configuration which allows these forces to resolve themselves.

—Richard Gabriel• A pattern is an idea that has been useful in one practical context and will probably be useful in others.

—Martin Fowler

Page 4: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Pattern in nutshell

Page 5: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Categorizing Patterns

Page 6: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Table of Contents• Pattern

• Tiered Approach

• Concept Traceability

• Software Automation

• Development Pattern

• Architecture Approach

Page 7: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Tiered ApproachClient Tier

Application clients, applets, applications and other GUIs

Presentation Tier

JSP, Servlets and other UI elements

Business Tier

EJBs and other business objects

Integration Tier

JMS, JDBC, Connectors, and Legacy

Resource Tier

Databases, external systems, and legacy resources

User interactions, UI presentation, devices

SSO, session management,content creation, format anddelivery

Business logic, transactions,data, and services

Resource adapters, legacy,External systems, rules Engines, workflow

Resources, data and external services

Page 8: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Table of Contents• Pattern

• Tiered Approach

• Concept Traceability

• Software Automation

• Development Pattern

• Architecture Approach

Page 9: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Concept Traceability

Confidential Proprietary

Continuous Integration

logging

Business Management

Message Queue

Concepts

Architectural Goals and Constraints

reliabilityperforman

ceextensibili

tyscalability

Security

Web Development

Data Management

Enterprise Service Bus

Degree of Support

Low High

Search

reusability

1 2 3 4 5

Portability/

distribution

Control visibility

Source Control ManagementRepository

Management

Build System

Page 10: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Table of Contents• Pattern

• Tiered Approach

• Concept Traceability

• Software Automation

• Development Pattern

• Architecture Approach

Page 11: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Software Development Automation

Page 12: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Table of Contents• Pattern

• Tiered Approach

• Concept Traceability

• Software Automation

• Development Pattern

• Architecture Approach

Page 13: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Development Pattern

Primary Tier

Framework Tier

Services Tier

Application Tier

database

users

Page 14: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Primary TierSourc

e C

ontr

ol

Repository Manager

Build System and Dependency Manager

Test Driven Development

Continuous Integration

Web Content Management System

Control Project

Issue tracking

Soft

ware

Team

Ente

rpri

se W

eb P

ort

al

Page 15: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Primary Tier Roadmap2 3 4 510steps priority

Best usage of source control

Test Driven Development

Build System /Dependancy Mgmnt.

Control Project /Software Methodology

RepositoryManagement

Web Content Management

Software Portal

Continuous Integration

Keys To Success

Clear and Agreed Vision Developers Integrity Change Management

Page 16: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Primary TierSource Control Management

Page 17: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Primary TierRepository Management

Page 18: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Development Style

Page 19: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Framework Tier

SBX DB

SAS .Net Mainframe

Business layer

Backend layer

Web GUI providers

Presentation layer

MQ service providers

.Net MainframeePension user

Adapter layer

3rd Party services

Web services providers

ExternalMainframe .NetSilverlight

MId

dle

La

yer

Page 20: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Table of Contents• Pattern

• Tiered Approach

• Concept Traceability

• Software Automation

• Development Pattern

• Architecture Approach

Page 21: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

Confidential Proprietary

Enterprise Web Portal

database

users

Business Services

People andorganization

SSOAll Web Applications Reports

Product Models

Bill of Material

Inventory Orders

FirmaMass

EnrollmentInvoicing Accounting Budgeting

Hum

an

Resource

Business Manager FacadeServiceCommand

Presentation Tier

Business Tier

Generic Data Access Object

OLTP Objects OLAP Objects

Enterprise S

ervice Bus P

lug abilityData Tier

Integration Tier

Architecture ApproachLogging

Authen

tication and A

uthorization

ExceptionHandling

SOI (BPEL/ESB)

Lifecycle Management

MetadataManagmnt

Event Managmnt

DataQuality

Managmnt

Fram

ew

ork Tier

search

Page 22: Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture

• Software Architecture • April-10 Confidential Proprietary

Life creates questions. Together our world can write the answers.

-- Josh

January 2011