SlideShare a Scribd company logo
1 of 2
Download to read offline
Simplified Domain Driven Development & MicroService Meta-Model
Boundary
The Merriam-Webster defines boundary as a limit of a subject. In the context of MicroServices, boundary refers to the
functional,operational and data limits associatedwith a piece of softwarethat exhibit the characteristicsof MicroServices.
(Business)Bounded Context
Represents a logical subset of one or many business capabilities that provides business value from the perspective of a role.
Therefore,the boundaries of the logical subset define a business context in which the role is bound to operate.
Business Capability
Describes what a business does to reach its objectives, instead of how it does it (business processes). The goal of business
capabilities is to model a business on its most stable elements, as they are the top layer of the business architecture. Business
capabilities are governed by the business principles of the organization. The capabilities are realized by business processes and
performed by one or many roles (i.e. an individual or team) in the organization.
Business Domain
An area of business (by engaging in commerce) with its own semantics, regulations,rules, functionalbehavior, and governance.
Context Map
A Context Map is designated as the primary tool used to make context boundaries explicit (source: Domain Driven Design © 2003
Eric Evans)
MicroService
A MicroService architectural style is an approach to developing a single application as a suite of small services (MicroServices),
each running in its own process and communicating with lightweight mechanisms, often an HTTP resource API. These services or
MicroServices are built around business capabilities and independently deployable by fully automated deployment machinery.
There is a bare minimum of centralized management of these services, which may be written in different programming
languages and use different data storagetechnologies(source: ThoughtWorks).
Model
A model serves as an abstraction or an approximate representation of a real item that is being built. A model may either be
physical or less tangible, such as financial models. In the context of MicroServices, models capture the (business) elements
within a ( business) bounded context, along with their inter-relationships.
Role
The responsibility for performing specific behavior, to which an actor can be assigned.
Actor
An organizationalentity that is capable of performing behavior.
© 2016 PhilippeAssouline
DDD & MicroService Meta Model
Business Architecture
Meta-Model
Methodology for MicroServices Inference: A Traceable Approach
One or many roles must first be
selected, as they define the number
and shape of business bonded contexts.
The role’s viewpoints are then applied
to an organization’s Business Capability
Model to identify business bonded
contexts.
Once business bounded contexts had
been identified, a Context Map is then
created to understand the possible
inter-connections and inter-
dependencies between business
contexts.
Subsequently, user stories are
established for each business bonded
context associated with each of the
roles.
Once user stories had been
written, various models are
developed to understand both,
business and technology elements,
that are necessary to digitize the
business bounded contexts under
consideration.
The proposed list of models is not
exhaustive. Additional artifacts
may be developed based on needs.
A gap analysis and
rationalization of all
business and
technology items is
suggested to resolve
possible conflicts
among elements
bearing the same
name but with
different behaviors.
Similar to the CRC agile
technique, the Service
Responsibly Cards capture the
MicroServices’ single functional
responsibility (SRP Principle).
Coupled with a MicroServices
Map, collaborations,
interactions, and sequencing
between MicroServices can be
modeled to validate the
proposed technology solutions,
and understand the messages
being exchanged among them.© 2016 PhilippeAssouline
MicroServices are
subsequently inferred after
both business and
technology elements had
been rationalized.
The discovery of
MicroServices is likely to be
an iterative process,
concluding with the
promotion of MicroServices
from candidate to first-class
citizen.

More Related Content

What's hot

5 Surefire Ways To Make Your Soa A Success
5 Surefire Ways To Make Your Soa A Success5 Surefire Ways To Make Your Soa A Success
5 Surefire Ways To Make Your Soa A Success
David Linthicum
 
Soa Taking Theory Into Real World Application
Soa Taking Theory Into Real World ApplicationSoa Taking Theory Into Real World Application
Soa Taking Theory Into Real World Application
David Linthicum
 
Web 2 0 To The Universal Soa
Web 2 0 To The Universal SoaWeb 2 0 To The Universal Soa
Web 2 0 To The Universal Soa
David Linthicum
 
Using the LEADing Practice Capability Reference Content
Using the LEADing Practice Capability Reference ContentUsing the LEADing Practice Capability Reference Content
Using the LEADing Practice Capability Reference Content
Global University Alliance
 
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise ArchitectureOptimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
Nathaniel Palmer
 

What's hot (12)

5 Surefire Ways To Make Your Soa A Success
5 Surefire Ways To Make Your Soa A Success5 Surefire Ways To Make Your Soa A Success
5 Surefire Ways To Make Your Soa A Success
 
Soa To The Rescue
Soa To The RescueSoa To The Rescue
Soa To The Rescue
 
Soa Taking Theory Into Real World Application
Soa Taking Theory Into Real World ApplicationSoa Taking Theory Into Real World Application
Soa Taking Theory Into Real World Application
 
Lecture 3 - Services
Lecture 3 - ServicesLecture 3 - Services
Lecture 3 - Services
 
Web 2 0 To The Universal Soa
Web 2 0 To The Universal SoaWeb 2 0 To The Universal Soa
Web 2 0 To The Universal Soa
 
Lecture 2 - SOA
Lecture 2 - SOALecture 2 - SOA
Lecture 2 - SOA
 
Using the LEADing Practice Capability Reference Content
Using the LEADing Practice Capability Reference ContentUsing the LEADing Practice Capability Reference Content
Using the LEADing Practice Capability Reference Content
 
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise ArchitectureOptimizing Value to the Enterprise with Integrated Enterprise Architecture
Optimizing Value to the Enterprise with Integrated Enterprise Architecture
 
2021 nfs leading with context
2021 nfs leading with context2021 nfs leading with context
2021 nfs leading with context
 
SUCCESS-DRIVING BUSINESS MODEL CHARACTERISTICS OF IAAS AND PAAS PROVIDERS
SUCCESS-DRIVING BUSINESS MODEL CHARACTERISTICS OF IAAS AND PAAS PROVIDERSSUCCESS-DRIVING BUSINESS MODEL CHARACTERISTICS OF IAAS AND PAAS PROVIDERS
SUCCESS-DRIVING BUSINESS MODEL CHARACTERISTICS OF IAAS AND PAAS PROVIDERS
 
Lecture 01 - Motivation
Lecture 01 - MotivationLecture 01 - Motivation
Lecture 01 - Motivation
 
Business Management of I.T. Services_Big Picture
Business Management of I.T. Services_Big PictureBusiness Management of I.T. Services_Big Picture
Business Management of I.T. Services_Big Picture
 

Viewers also liked

Viewers also liked (16)

淺談 Groovy 與 Gradle
淺談 Groovy 與 Gradle淺談 Groovy 與 Gradle
淺談 Groovy 與 Gradle
 
企业应用架构:模块化、微服务与 Linux 容器技术
企业应用架构:模块化、微服务与 Linux 容器技术企业应用架构:模块化、微服务与 Linux 容器技术
企业应用架构:模块化、微服务与 Linux 容器技术
 
Applying Domain-Driven Design to APIs and Microservices - Austin API Meetup
Applying Domain-Driven Design to APIs and Microservices  - Austin API MeetupApplying Domain-Driven Design to APIs and Microservices  - Austin API Meetup
Applying Domain-Driven Design to APIs and Microservices - Austin API Meetup
 
Apache Maven
Apache MavenApache Maven
Apache Maven
 
2.美团点评技术沙龙08 微服务是银弹么
2.美团点评技术沙龙08   微服务是银弹么2.美团点评技术沙龙08   微服务是银弹么
2.美团点评技术沙龙08 微服务是银弹么
 
Brown bag eventdrivenmicroservices-cqrs
Brown bag  eventdrivenmicroservices-cqrsBrown bag  eventdrivenmicroservices-cqrs
Brown bag eventdrivenmicroservices-cqrs
 
Gradle
GradleGradle
Gradle
 
Developing, Testing and Scaling with Apache Camel - UberConf 2015
Developing, Testing and Scaling with Apache Camel - UberConf 2015Developing, Testing and Scaling with Apache Camel - UberConf 2015
Developing, Testing and Scaling with Apache Camel - UberConf 2015
 
DDD / Microservices @ Trivento Spring Camp, Utrecht, 2015
DDD / Microservices @ Trivento Spring Camp, Utrecht, 2015DDD / Microservices @ Trivento Spring Camp, Utrecht, 2015
DDD / Microservices @ Trivento Spring Camp, Utrecht, 2015
 
Faster java ee builds with gradle [con4921]
Faster java ee builds with gradle [con4921]Faster java ee builds with gradle [con4921]
Faster java ee builds with gradle [con4921]
 
Gradle a new Generation Build Tool
Gradle a new Generation Build ToolGradle a new Generation Build Tool
Gradle a new Generation Build Tool
 
REST with Spring Boot #jqfk
REST with Spring Boot #jqfkREST with Spring Boot #jqfk
REST with Spring Boot #jqfk
 
Designing APIs and Microservices Using Domain-Driven Design
Designing APIs and Microservices Using Domain-Driven DesignDesigning APIs and Microservices Using Domain-Driven Design
Designing APIs and Microservices Using Domain-Driven Design
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice Architecture
 
Developing microservices with aggregates (SpringOne platform, #s1p)
Developing microservices with aggregates (SpringOne platform, #s1p)Developing microservices with aggregates (SpringOne platform, #s1p)
Developing microservices with aggregates (SpringOne platform, #s1p)
 
Microservice With Spring Boot and Spring Cloud
Microservice With Spring Boot and Spring CloudMicroservice With Spring Boot and Spring Cloud
Microservice With Spring Boot and Spring Cloud
 

Similar to Methodology for MicroServices Inference v1.0

Architecting Your Enterprise
Architecting Your EnterpriseArchitecting Your Enterprise
Architecting Your Enterprise
Ed Seidewitz
 
Beyond a Product View of Architecture
Beyond a Product View of ArchitectureBeyond a Product View of Architecture
Beyond a Product View of Architecture
Nathaniel Palmer
 
Is The Architectures Of The Convnets ) For Action...
Is The Architectures Of The Convnets ) For Action...Is The Architectures Of The Convnets ) For Action...
Is The Architectures Of The Convnets ) For Action...
Sheila Guy
 
Data Visualisation
Data VisualisationData Visualisation
Data Visualisation
Noel Hatch
 
Extending Role-based Access Control for Business UsageHeik.docx
Extending Role-based Access Control for Business UsageHeik.docxExtending Role-based Access Control for Business UsageHeik.docx
Extending Role-based Access Control for Business UsageHeik.docx
mecklenburgstrelitzh
 

Similar to Methodology for MicroServices Inference v1.0 (20)

1. Why Event-Driven Microservices _ Building Event-Driven Microservices.pdf
1. Why Event-Driven Microservices _ Building Event-Driven Microservices.pdf1. Why Event-Driven Microservices _ Building Event-Driven Microservices.pdf
1. Why Event-Driven Microservices _ Building Event-Driven Microservices.pdf
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft Mimarisi
 
Itlc hanoi ba day 3 - thai son - data modelling
Itlc hanoi   ba day 3 - thai son - data modellingItlc hanoi   ba day 3 - thai son - data modelling
Itlc hanoi ba day 3 - thai son - data modelling
 
Architecting Your Enterprise
Architecting Your EnterpriseArchitecting Your Enterprise
Architecting Your Enterprise
 
Visible® MaaS Cloud Presentation Authors: Nuccio Piscopo and Michael Cesino
Visible® MaaS Cloud Presentation Authors: Nuccio Piscopo and Michael CesinoVisible® MaaS Cloud Presentation Authors: Nuccio Piscopo and Michael Cesino
Visible® MaaS Cloud Presentation Authors: Nuccio Piscopo and Michael Cesino
 
EA and SOA
EA and SOAEA and SOA
EA and SOA
 
Organic Planning
Organic PlanningOrganic Planning
Organic Planning
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
 
Microservices in the Enterprise: A Research Study and Reference Architecture
Microservices in the Enterprise: A Research Study and Reference ArchitectureMicroservices in the Enterprise: A Research Study and Reference Architecture
Microservices in the Enterprise: A Research Study and Reference Architecture
 
Beyond a Product View of Architecture
Beyond a Product View of ArchitectureBeyond a Product View of Architecture
Beyond a Product View of Architecture
 
DESIGN AND DEVELOPMENT OF BUSINESS RULES MANAGEMENT SYSTEM (BRMS) USING ATLAN...
DESIGN AND DEVELOPMENT OF BUSINESS RULES MANAGEMENT SYSTEM (BRMS) USING ATLAN...DESIGN AND DEVELOPMENT OF BUSINESS RULES MANAGEMENT SYSTEM (BRMS) USING ATLAN...
DESIGN AND DEVELOPMENT OF BUSINESS RULES MANAGEMENT SYSTEM (BRMS) USING ATLAN...
 
Is The Architectures Of The Convnets ) For Action...
Is The Architectures Of The Convnets ) For Action...Is The Architectures Of The Convnets ) For Action...
Is The Architectures Of The Convnets ) For Action...
 
Dynamic approach of salesforce development in business
Dynamic approach of salesforce development in businessDynamic approach of salesforce development in business
Dynamic approach of salesforce development in business
 
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...
 
ExperiaSphere: Open-Source Management and Orchestration--Introduction
ExperiaSphere: Open-Source Management and Orchestration--IntroductionExperiaSphere: Open-Source Management and Orchestration--Introduction
ExperiaSphere: Open-Source Management and Orchestration--Introduction
 
Data Visualisation
Data VisualisationData Visualisation
Data Visualisation
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther
 
Plastic
PlasticPlastic
Plastic
 
Extending Role-based Access Control for Business UsageHeik.docx
Extending Role-based Access Control for Business UsageHeik.docxExtending Role-based Access Control for Business UsageHeik.docx
Extending Role-based Access Control for Business UsageHeik.docx
 
meta360 - enterprise data governance and metadata management
meta360 - enterprise data governance and metadata managementmeta360 - enterprise data governance and metadata management
meta360 - enterprise data governance and metadata management
 

Recently uploaded

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

Methodology for MicroServices Inference v1.0

  • 1. Simplified Domain Driven Development & MicroService Meta-Model Boundary The Merriam-Webster defines boundary as a limit of a subject. In the context of MicroServices, boundary refers to the functional,operational and data limits associatedwith a piece of softwarethat exhibit the characteristicsof MicroServices. (Business)Bounded Context Represents a logical subset of one or many business capabilities that provides business value from the perspective of a role. Therefore,the boundaries of the logical subset define a business context in which the role is bound to operate. Business Capability Describes what a business does to reach its objectives, instead of how it does it (business processes). The goal of business capabilities is to model a business on its most stable elements, as they are the top layer of the business architecture. Business capabilities are governed by the business principles of the organization. The capabilities are realized by business processes and performed by one or many roles (i.e. an individual or team) in the organization. Business Domain An area of business (by engaging in commerce) with its own semantics, regulations,rules, functionalbehavior, and governance. Context Map A Context Map is designated as the primary tool used to make context boundaries explicit (source: Domain Driven Design © 2003 Eric Evans) MicroService A MicroService architectural style is an approach to developing a single application as a suite of small services (MicroServices), each running in its own process and communicating with lightweight mechanisms, often an HTTP resource API. These services or MicroServices are built around business capabilities and independently deployable by fully automated deployment machinery. There is a bare minimum of centralized management of these services, which may be written in different programming languages and use different data storagetechnologies(source: ThoughtWorks). Model A model serves as an abstraction or an approximate representation of a real item that is being built. A model may either be physical or less tangible, such as financial models. In the context of MicroServices, models capture the (business) elements within a ( business) bounded context, along with their inter-relationships. Role The responsibility for performing specific behavior, to which an actor can be assigned. Actor An organizationalentity that is capable of performing behavior. © 2016 PhilippeAssouline DDD & MicroService Meta Model Business Architecture Meta-Model
  • 2. Methodology for MicroServices Inference: A Traceable Approach One or many roles must first be selected, as they define the number and shape of business bonded contexts. The role’s viewpoints are then applied to an organization’s Business Capability Model to identify business bonded contexts. Once business bounded contexts had been identified, a Context Map is then created to understand the possible inter-connections and inter- dependencies between business contexts. Subsequently, user stories are established for each business bonded context associated with each of the roles. Once user stories had been written, various models are developed to understand both, business and technology elements, that are necessary to digitize the business bounded contexts under consideration. The proposed list of models is not exhaustive. Additional artifacts may be developed based on needs. A gap analysis and rationalization of all business and technology items is suggested to resolve possible conflicts among elements bearing the same name but with different behaviors. Similar to the CRC agile technique, the Service Responsibly Cards capture the MicroServices’ single functional responsibility (SRP Principle). Coupled with a MicroServices Map, collaborations, interactions, and sequencing between MicroServices can be modeled to validate the proposed technology solutions, and understand the messages being exchanged among them.© 2016 PhilippeAssouline MicroServices are subsequently inferred after both business and technology elements had been rationalized. The discovery of MicroServices is likely to be an iterative process, concluding with the promotion of MicroServices from candidate to first-class citizen.