Upload
charles-bishop
View
223
Download
0
Tags:
Embed Size (px)
Citation preview
• Software Architecture • April-10 Confidential Proprietary
Click to edit Master text styles
Second levelThird level
Fourth level
Fifth level • Software Architecture • April-10
Click to edit Master text styles
Second levelThird level
Fourth level
Fifth level 1
Application Standard Development
Confidential Proprietary
Table of Contents• Pattern
• Tiered Approach
• Concept Traceability
• Software Automation
• Development Pattern
• Architecture Approach
Confidential Proprietary
What’s Pattern in Computer Science?
• Each pattern is a three-part rule, which expresses a relation between a certain context, a problem, and a solution.
—Christopher Alexander
• Each pattern is a three-part rule, which expresses a relation between a certain context, a certain system of forces which occurs repeatedly in that context, and a certain software configuration which allows these forces to resolve themselves.
—Richard Gabriel• A pattern is an idea that has been useful in one practical context and will probably be useful in others.
—Martin Fowler
Confidential Proprietary
Pattern in nutshell
Confidential Proprietary
Categorizing Patterns
Confidential Proprietary
Table of Contents• Pattern
• Tiered Approach
• Concept Traceability
• Software Automation
• Development Pattern
• Architecture Approach
Confidential Proprietary
Tiered ApproachClient Tier
Application clients, applets, applications and other GUIs
Presentation Tier
JSP, Servlets and other UI elements
Business Tier
EJBs and other business objects
Integration Tier
JMS, JDBC, Connectors, and Legacy
Resource Tier
Databases, external systems, and legacy resources
User interactions, UI presentation, devices
SSO, session management,content creation, format anddelivery
Business logic, transactions,data, and services
Resource adapters, legacy,External systems, rules Engines, workflow
Resources, data and external services
Confidential Proprietary
Table of Contents• Pattern
• Tiered Approach
• Concept Traceability
• Software Automation
• Development Pattern
• Architecture Approach
Concept Traceability
Confidential Proprietary
Continuous Integration
logging
Business Management
Message Queue
Concepts
Architectural Goals and Constraints
reliabilityperforman
ceextensibili
tyscalability
Security
Web Development
Data Management
Enterprise Service Bus
Degree of Support
Low High
Search
reusability
1 2 3 4 5
Portability/
distribution
Control visibility
Source Control ManagementRepository
Management
Build System
Confidential Proprietary
Table of Contents• Pattern
• Tiered Approach
• Concept Traceability
• Software Automation
• Development Pattern
• Architecture Approach
Confidential Proprietary
Software Development Automation
Confidential Proprietary
Table of Contents• Pattern
• Tiered Approach
• Concept Traceability
• Software Automation
• Development Pattern
• Architecture Approach
Confidential Proprietary
Development Pattern
Primary Tier
Framework Tier
Services Tier
Application Tier
database
users
Confidential Proprietary
Primary TierSourc
e C
ontr
ol
Repository Manager
Build System and Dependency Manager
Test Driven Development
Continuous Integration
Web Content Management System
Control Project
Issue tracking
Soft
ware
Team
Ente
rpri
se W
eb P
ort
al
Confidential Proprietary
Primary Tier Roadmap2 3 4 510steps priority
Best usage of source control
Test Driven Development
Build System /Dependancy Mgmnt.
Control Project /Software Methodology
RepositoryManagement
Web Content Management
Software Portal
Continuous Integration
Keys To Success
Clear and Agreed Vision Developers Integrity Change Management
Confidential Proprietary
Primary TierSource Control Management
Confidential Proprietary
Primary TierRepository Management
Confidential Proprietary
Development Style
Confidential Proprietary
Framework Tier
SBX DB
SAS .Net Mainframe
Business layer
Backend layer
Web GUI providers
Presentation layer
MQ service providers
.Net MainframeePension user
Adapter layer
3rd Party services
Web services providers
ExternalMainframe .NetSilverlight
MId
dle
La
yer
Confidential Proprietary
Table of Contents• Pattern
• Tiered Approach
• Concept Traceability
• Software Automation
• Development Pattern
• Architecture Approach
Confidential Proprietary
Enterprise Web Portal
database
users
Business Services
People andorganization
SSOAll Web Applications Reports
Product Models
Bill of Material
Inventory Orders
FirmaMass
EnrollmentInvoicing Accounting Budgeting
Hum
an
Resource
Business Manager FacadeServiceCommand
Presentation Tier
Business Tier
Generic Data Access Object
OLTP Objects OLAP Objects
Enterprise S
ervice Bus P
lug abilityData Tier
Integration Tier
Architecture ApproachLogging
Authen
tication and A
uthorization
ExceptionHandling
SOI (BPEL/ESB)
Lifecycle Management
MetadataManagmnt
Event Managmnt
DataQuality
Managmnt
Fram
ew
ork Tier
search
• Software Architecture • April-10 Confidential Proprietary
Life creates questions. Together our world can write the answers.
-- Josh
January 2011