SlideShare a Scribd company logo
Building an
Building an eCommerce
eCommerce
Solution Architecture
Solution Architecture
Vin D
Vin D’
’Amico
Amico
President
President
vin
vin@
@damicon
damicon.com
.com
January 2002
January 2002
New England Electronic Commerce Users' Group
New England Electronic Commerce Users' Group
Goals
Goals
Introduce Damicon, LLC
Define “Architecture”
Show Sample Architectures
Share Best Practices
Compare Web Services
Who is D
Who is DAMICON, LLC
AMICON, LLC?
?
Information Technology Advisors
IT Help Desk Enhancers
Adjunct CIOs
IT Change Agents
It
It’
’s not about technology, it
s not about technology, it’
’s about business!
s about business!
Core Competencies
Core Competencies
IT Process Reengineering
Technical Consulting
Program Management
Planning and Execution Methodologies
Joint Requirements Planning
IT Training and Mentoring
IT Staffing
What is Architecture
What is Architecture
and
and
Why is it Important?
Why is it Important?
“
“A common mistake that people make
A common mistake that people make
when trying to design something
when trying to design something
completely foolproof is to
completely foolproof is to
underestimate the ingenuity of
underestimate the ingenuity of
complete fools.
complete fools.”
”
-
- Douglas Adams, Author
Douglas Adams, Author
Formal description of a system at the
Formal description of a system at the
component level.
component level.
The structure of components, their
The structure of components, their
interrelationships, and the principles
interrelationships, and the principles
governing their design and evolution
governing their design and evolution
over time.
over time.
Architecture Definition
Architecture Definition
Why Architecture?
Why Architecture?
Lower software development, support, and
maintenance costs
Improved interoperability and easier system
and network management
Simpler upgrade and exchange of system
components
Reduced complexity in IT infrastructure
Flexibility to make, buy, or outsource IT
solutions
Architecture is Critical In
Architecture is Critical In…
…
Delivering an enterprise-computing system
Providing control points to manage complexity
Maintaining system integrity
Unifying component structure
Organizing people and processes
Generating rules for growing the system
Protecting an enterprise system
Architecture Goals
Architecture Goals
1. Accommodate Change
2. Adhere to Standards
3. Scale as Business Grows
4. Provide Full Functionality
5. Deliver Low Response Times
6. Be Reliable
7. Interoperate with Other Systems
8. Provide Robust Security
9. Be Simple to Manage
10. Service International Users
Architecture Elements
Architecture Elements
Personal Systems
– Desktops, PDAs, Phones, Pagers, etc.
Network Components
– Routers, Load Balancers, Switches, etc.
Security Elements
– Firewalls, Encryption, VPNs, etc.
Servers
– Web, App, DB, Directory, etc.
Application Components / Web Services
– Packaged and/or Custom
Data
– Local, Remote, Internal, External
Examples of Architecture
Examples of Architecture
Basic 3
Basic 3-
-Tier Architecture
Tier Architecture
Database Server(s)
Application Server(s)
Database(s)
Database(s)
The Internet
Web Server(s)
Users
Physical Architecture
Physical Architecture
Infrastructure Services
Infrastructure Services
Complex Distributed Architecture
Complex Distributed Architecture
Administration Services
Administration Services
Transaction Processing
Transaction Processing
Data Management
Data Management
Presentation Services
Presentation Services
Personal Services
Personal Services
Network
Overlay
Network
Overlay
Security
Overlay
Security
Overlay
• Any Browser-based
Device:
• Desktop
• Laptop
• Handheld
• Phone
• Appliance
• etc.
Personal Services
Personal Services
• Best Practices:
• Adhere to Standards
• Avoid Browser-
Specific Features
• Minimize Decision
Logic
• Use Java or C# for
Complex Functions
Presentation Services
• Formatting Logic
• Dynamic Content
Delivery
• Portlets
• Reporting
• Internationalization
• Best Practices:
–Separate Data
Retrieval from
Formatting
–Don’t Mix Business
Rules and Display
Logic
–See Model-View-
Control and Layer
Patterns
Data Management Services
• Searching
• Categorization
• Content Aggregation
• Group Collaboration
• Personalization
• Distribution
• Best Practices:
• Identify User Types
• Focus on User Goals
• Consider Performance
• See Presentation-
Abstraction-Control
and Chain of
Responsibility Patterns
Transaction Processing Services
• Transaction
Management
• Metadata Control
• Application Interfaces
• Business Rules
• Data Interchange
• Best Practices:
• Focus on Interfaces
• Beware Incomplete
User Activities
• Think Services
• Do Not Hard Code
Business Rules
• See Adapter, Façade,
Proxy, Observer and,
Broker Patterns
Administration Services
• Directory Services
(LDAP)
• System Administration
• State Management
• Session Management
• User Controls
• Rules Definition
• Best Practices:
• Define Policies
• Control System
States
• Anticipate Growth
• See Command and
Microkernel Patterns
Infrastructure Services
• Data Access
• Communications
• Process and Thread
Management
• Sun One and MS .Net
• Content Repositories
• Best Practices:
• Adhere to Standards
• Understand Data
• Model Data
• Manage Data
• See Abstract Factory
and Mediator
Patterns
Security Overlay
• Hardware Firewalls
• Software Firewalls
• SSL and WTLS
• VPN’s
• Encryption
• Best Practices:
• Establish Policies
• Secure the Perimeters
• Monitor for Intrusions
• Stay Aware
• Patch, Patch, Patch
Network Overlay
• Routers
• Load Balancers
• Switches
• Gateways
• Modems
• Hubs
• Cabling
• Best Practices:
• Separate Major
Workgroups
• Separate Major
Applications
• Constantly Review
Structure
• Document, Label,
Diagram
Physical Architecture
Physical Architecture
Web Services
Web Services
Major Players
– IBM (WebSphere)
– Microsoft (“.NET”)
– Sun Microsystems (Sun ONE)
Problem Space
– Distributed Applications
– Interoperability
Solution Space
– XML
– Interfaces
Sun ONE
J2EE
JDBC
JVM
Java
EJB
JSP
JNDI
JAX_
MS .Net
Win XP
ODBC
MSIL
CLR
C#
VB.Net
ASP.Net
ADO.Net
SOAP
WSDL
UDDI
XML
Web Services
Web Services
Think Interfaces!
Think Interfaces!
Resources
Resources
The Open Group (TOGAF)
– http://www.opengroup.org
Portland Pattern Repository
– http://c2.com/cgi-bin/wiki?PatternIndex
– http://c2.com/cgi-bin/wiki?AntiPatterns
Microsoft (“.NET” initiative)
– http://www.microsoft.com/net
Sun (“Sun ONE” initiative)
– http://www.sun.com/sunone
Acronym Finder
– http://acronymfinder.com
New England Electronic Commerce Users' Group
New England Electronic Commerce Users' Group

More Related Content

Similar to Architecture Practices

Digital Group Corporate Brochure
Digital Group Corporate BrochureDigital Group Corporate Brochure
Digital Group Corporate BrochureMustafabalsara
 
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Adrian Hall
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
Andrew White
 
SPSChicagoBurbs 2019 - What is CDM and CDS?
SPSChicagoBurbs 2019 - What is CDM and CDS?SPSChicagoBurbs 2019 - What is CDM and CDS?
SPSChicagoBurbs 2019 - What is CDM and CDS?
Nicolas Georgeault
 
Data Services Marketplace
Data Services MarketplaceData Services Marketplace
Data Services Marketplace
Denodo
 
Soa
SoaSoa
Value of Smart Business Networks
Value of Smart Business NetworksValue of Smart Business Networks
Value of Smart Business Networks
Eric van Heck
 
Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)
Denodo
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
Techcello
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentationwebhostingguy
 
Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions
Icinga
 
Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]rickkhosla
 
Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...
Safe Software
 
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieSpca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieNCCOMMS
 
Cloud Computing Workshop
Cloud Computing WorkshopCloud Computing Workshop
Cloud Computing Workshop
Gaurav Malik
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Serviceswebhostingguy
 
Data Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft Fabric
Nathan Bijnens
 
Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the Cloud
Precisely
 
Gaining operational excellence through it optimization & ea
Gaining operational excellence through it optimization & eaGaining operational excellence through it optimization & ea
Gaining operational excellence through it optimization & ea
Ken Ng
 

Similar to Architecture Practices (20)

Digital Group Corporate Brochure
Digital Group Corporate BrochureDigital Group Corporate Brochure
Digital Group Corporate Brochure
 
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module Matrix
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 
Legal issues in the cloud renzo marchini & gene landy
Legal issues in the cloud   renzo marchini & gene landyLegal issues in the cloud   renzo marchini & gene landy
Legal issues in the cloud renzo marchini & gene landy
 
SPSChicagoBurbs 2019 - What is CDM and CDS?
SPSChicagoBurbs 2019 - What is CDM and CDS?SPSChicagoBurbs 2019 - What is CDM and CDS?
SPSChicagoBurbs 2019 - What is CDM and CDS?
 
Data Services Marketplace
Data Services MarketplaceData Services Marketplace
Data Services Marketplace
 
Soa
SoaSoa
Soa
 
Value of Smart Business Networks
Value of Smart Business NetworksValue of Smart Business Networks
Value of Smart Business Networks
 
Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)Data Services and the Modern Data Ecosystem (ASEAN)
Data Services and the Modern Data Ecosystem (ASEAN)
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
 
Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions
 
Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]
 
Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...
 
Spca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackieSpca2014 navigating clouds sp_con14_mackie
Spca2014 navigating clouds sp_con14_mackie
 
Cloud Computing Workshop
Cloud Computing WorkshopCloud Computing Workshop
Cloud Computing Workshop
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Services
 
Data Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft Fabric
 
Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the Cloud
 
Gaining operational excellence through it optimization & ea
Gaining operational excellence through it optimization & eaGaining operational excellence through it optimization & ea
Gaining operational excellence through it optimization & ea
 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 

Architecture Practices

  • 1. Building an Building an eCommerce eCommerce Solution Architecture Solution Architecture Vin D Vin D’ ’Amico Amico President President vin vin@ @damicon damicon.com .com January 2002 January 2002 New England Electronic Commerce Users' Group New England Electronic Commerce Users' Group
  • 2. Goals Goals Introduce Damicon, LLC Define “Architecture” Show Sample Architectures Share Best Practices Compare Web Services
  • 3. Who is D Who is DAMICON, LLC AMICON, LLC? ? Information Technology Advisors IT Help Desk Enhancers Adjunct CIOs IT Change Agents It It’ ’s not about technology, it s not about technology, it’ ’s about business! s about business!
  • 4. Core Competencies Core Competencies IT Process Reengineering Technical Consulting Program Management Planning and Execution Methodologies Joint Requirements Planning IT Training and Mentoring IT Staffing
  • 5. What is Architecture What is Architecture and and Why is it Important? Why is it Important?
  • 6. “ “A common mistake that people make A common mistake that people make when trying to design something when trying to design something completely foolproof is to completely foolproof is to underestimate the ingenuity of underestimate the ingenuity of complete fools. complete fools.” ” - - Douglas Adams, Author Douglas Adams, Author
  • 7. Formal description of a system at the Formal description of a system at the component level. component level. The structure of components, their The structure of components, their interrelationships, and the principles interrelationships, and the principles governing their design and evolution governing their design and evolution over time. over time. Architecture Definition Architecture Definition
  • 8. Why Architecture? Why Architecture? Lower software development, support, and maintenance costs Improved interoperability and easier system and network management Simpler upgrade and exchange of system components Reduced complexity in IT infrastructure Flexibility to make, buy, or outsource IT solutions
  • 9. Architecture is Critical In Architecture is Critical In… … Delivering an enterprise-computing system Providing control points to manage complexity Maintaining system integrity Unifying component structure Organizing people and processes Generating rules for growing the system Protecting an enterprise system
  • 10. Architecture Goals Architecture Goals 1. Accommodate Change 2. Adhere to Standards 3. Scale as Business Grows 4. Provide Full Functionality 5. Deliver Low Response Times 6. Be Reliable 7. Interoperate with Other Systems 8. Provide Robust Security 9. Be Simple to Manage 10. Service International Users
  • 11. Architecture Elements Architecture Elements Personal Systems – Desktops, PDAs, Phones, Pagers, etc. Network Components – Routers, Load Balancers, Switches, etc. Security Elements – Firewalls, Encryption, VPNs, etc. Servers – Web, App, DB, Directory, etc. Application Components / Web Services – Packaged and/or Custom Data – Local, Remote, Internal, External
  • 13. Basic 3 Basic 3- -Tier Architecture Tier Architecture Database Server(s) Application Server(s) Database(s) Database(s) The Internet Web Server(s) Users
  • 15. Infrastructure Services Infrastructure Services Complex Distributed Architecture Complex Distributed Architecture Administration Services Administration Services Transaction Processing Transaction Processing Data Management Data Management Presentation Services Presentation Services Personal Services Personal Services Network Overlay Network Overlay Security Overlay Security Overlay
  • 16. • Any Browser-based Device: • Desktop • Laptop • Handheld • Phone • Appliance • etc. Personal Services Personal Services • Best Practices: • Adhere to Standards • Avoid Browser- Specific Features • Minimize Decision Logic • Use Java or C# for Complex Functions
  • 17. Presentation Services • Formatting Logic • Dynamic Content Delivery • Portlets • Reporting • Internationalization • Best Practices: –Separate Data Retrieval from Formatting –Don’t Mix Business Rules and Display Logic –See Model-View- Control and Layer Patterns
  • 18. Data Management Services • Searching • Categorization • Content Aggregation • Group Collaboration • Personalization • Distribution • Best Practices: • Identify User Types • Focus on User Goals • Consider Performance • See Presentation- Abstraction-Control and Chain of Responsibility Patterns
  • 19. Transaction Processing Services • Transaction Management • Metadata Control • Application Interfaces • Business Rules • Data Interchange • Best Practices: • Focus on Interfaces • Beware Incomplete User Activities • Think Services • Do Not Hard Code Business Rules • See Adapter, Façade, Proxy, Observer and, Broker Patterns
  • 20. Administration Services • Directory Services (LDAP) • System Administration • State Management • Session Management • User Controls • Rules Definition • Best Practices: • Define Policies • Control System States • Anticipate Growth • See Command and Microkernel Patterns
  • 21. Infrastructure Services • Data Access • Communications • Process and Thread Management • Sun One and MS .Net • Content Repositories • Best Practices: • Adhere to Standards • Understand Data • Model Data • Manage Data • See Abstract Factory and Mediator Patterns
  • 22. Security Overlay • Hardware Firewalls • Software Firewalls • SSL and WTLS • VPN’s • Encryption • Best Practices: • Establish Policies • Secure the Perimeters • Monitor for Intrusions • Stay Aware • Patch, Patch, Patch
  • 23. Network Overlay • Routers • Load Balancers • Switches • Gateways • Modems • Hubs • Cabling • Best Practices: • Separate Major Workgroups • Separate Major Applications • Constantly Review Structure • Document, Label, Diagram
  • 25. Web Services Web Services Major Players – IBM (WebSphere) – Microsoft (“.NET”) – Sun Microsystems (Sun ONE) Problem Space – Distributed Applications – Interoperability Solution Space – XML – Interfaces
  • 26. Sun ONE J2EE JDBC JVM Java EJB JSP JNDI JAX_ MS .Net Win XP ODBC MSIL CLR C# VB.Net ASP.Net ADO.Net SOAP WSDL UDDI XML Web Services Web Services Think Interfaces! Think Interfaces!
  • 27. Resources Resources The Open Group (TOGAF) – http://www.opengroup.org Portland Pattern Repository – http://c2.com/cgi-bin/wiki?PatternIndex – http://c2.com/cgi-bin/wiki?AntiPatterns Microsoft (“.NET” initiative) – http://www.microsoft.com/net Sun (“Sun ONE” initiative) – http://www.sun.com/sunone Acronym Finder – http://acronymfinder.com
  • 28. New England Electronic Commerce Users' Group New England Electronic Commerce Users' Group