SlideShare a Scribd company logo
1 of 29
1
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
SATURN 2019
Developing IIOT System Using
Microservices and Its Architectural
Evaluation Using
ATAM (Architectural Trade Off
Method)
Sercan Cidem
Expert Software Engineer
Aselsan
2
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
About me
• @sercancidem
• Expert Developer at Aselsan
• Architecture, DevOps, 8 years of experience
• Works on experimenting with the cutting edge of cloud technologies
like Kubernetes & Microservices
• Interested in the Cloud, Big Data, Iot Technologies and improving
company culture
3
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
About Aselsan Inc.
• ASELSAN is the largest defense electronics company of Turkey.
• Listed as one of the top 100 defense companies of the world (Defense News
Top 100).
• ASELSAN UGES specialized on IIOT products for Transportation, Security,
Energy and Medical systems.
4
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Outline
• Introduction
• Architectural Design and Analysis
• Business Drivers
• Quality Attributes, Scenarios and Architectural Analysis
• Result
5
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Introduction
Product Owner: Aselsan Transportation, Security, Energy and Automation Systems Sector
Presidency (UGES)
Project: An infrastructure project aimed to control field assets from various domains
remotely. (energy, manufacturing, pipeline, etc.)
Converting the data received from the remote terminal units on the relevant protocols to the
common data model and storing & analyzing of this data
Primary Target: Electricity network grid management (Energy Distribution, Generation,
Transmission Systems)
Project Model: Working with subcontractor for design, software development and execution
of tests
Project Type: I-Iot Application(Distribution Network-Power grid quality monitoring system),
developed for one of the biggest electricity distribution utility in Turkey. (Türkiye - BEDAS)
6
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Endüstriyel Nesnelerin İnterneti Referans Mimarisi
Rabbit MQ
Devices
Sensors
Remote
Terminal Unit
Adapter Topologies
Standard Middleware
Current Protocol
CIM Data ModelCurrent Protocol
Web Based User Interface
Dashboard
Alarm Manager
Communication
Manager
User Manager
Topology
Docker Swarm
Overall Architecture (Implementation Viewpoint)
7
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Software Architectural Design Process
8
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Architecture Tradeoff Analysis Method
“The Architecture Tradeoff Analysis Method (ATAM) is a
method for evaluating software architectures relative to
quality attribute goals. ATAM evaluations expose
architectural risks that potentially inhibit the
achievement of an organization's business goals”
- Software Engineering Institute
9
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
ATAM Process
Presentation
1. Present the ATAM
2. Present business drivers
3. Present Architecture
Investigation and Analysis
4. Identify Architectural Approaches
5. Generate Quality Attribute Utility Tree
6. Analyze Architectural Approaches
Testing
7. Brainstorm and Prioritize Scenarios
8. Analyze Architectural Approaches
Reporting
9. Present Results
10
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensitivity Points
Trade offs
Risks
Risk Themes
Scenarios
Conceptual Flow of ATAM-Based Architectural Analysis
Analysis
Impacts
Distilled
into
11
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensitivity Points
Trade offs
Risks
Risk Themes
Scenarios
Conceptual Flow of ATAM-Based Architectural Analysis
• Stakeholders and their
Effects on Architecture
• Scope of Work
• Main Use Cases
affecting architecture
• Architectural
Concerns
• Limitations
Analysis
12
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensivity Points
Trade offs
Risks
Risk Themes
Scenarious
Conceptual Flow of ATAM-Based Architectural Analysis
• Stakeholders and their
Effects on Architecture
• Scope of Work
• Main Use Cases
affecting architecture
• Architectural
Concerns
• Limitations
Analysis
Aselsan UGES Sector Presidency:
• Owns product and architectural design.
• Reuse reference architecture in multiple project as an
objective,
• Determines system requirements,
• Creates and directs the architecture,
• Technical orientation of software development activities,
• Participates in software development activities in certain
areas.
Subcontractor:
• The company conducts architectural design activities
with Aselsan,
• Develops software.
End Customer:
• Distribution utility operators, determines user rqmts
13
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensivity Points
Trade offs
Risks
Risk Themes
Scenarious
Conceptual Flow of ATAM-Based Architectural Analysis
• Stakeholders and their
Effects on Architecture
• Scope of Work
• Main Use Cases
affecting architecture
• Architectural
Concerns
• Limitations
Analysis• All kinds of supply management (energy, natural
gas, water, etc.)
• First: electricity network grid management
(distribution, generation, transmission)
• High service availability 🡪 can be used for mission
critical systems
• A marketable product with interoperable and easy
installation
• Medium-term online stream analytics (alarm
generation) and machine learning
14
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensivity Points
Trade offs
Risks
Risk Themes
Scenarious
Conceptual Flow of ATAM-Based Architectural Analysis
• Stakeholders and their
Effects on Architecture
• Scope of Work
• Main Use Cases
affecting architecture
• Architectural
Concerns
• Limitations
Analysis
UC-1. Real-time display of data
UC-2. Saving to the database
UC-3. Creation of graphics
UC-4. Establishment and display of alarm conditions
UC-5 Sending command or configuration data
UC-6 Data analytics algorithms operation
15
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensivity Points
Trade offs
Risks
Risk Themes
Scenarious
Conceptual Flow of ATAM-Based Architectural Analysis
• Stakeholders and their
Effects on Architecture
• Scope of Work
• Main Use Cases
affecting architecture
• Architectural
Concerns
• Limitations
Analysis• Work on both local servers and cloud
• Scalability
• 7/24 working
• Redundant infrastructure
• Infrastructure capable of working clustered
• Support new protocols on external interfaces
• Service error / health etc. monitor their status
• Configure different external interfaces and
capabilities in projects
• Elimination of new software services
16
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensitivity Points
Trade offs
Risks
Risk Themes
Scenarios
Conceptual Flow of ATAM-Based Architectural Analysis
• Stakeholders and their
Effects on Architecture
• Scope of Work
• Main Use Cases
affecting architecture
• Architectural
Concerns
• Limitations
Analysis
• Prototype product within 1 year from the start of
the project
• The product supports the CIM [14] standard data
model
• Independent of operating system
• Multisite and multiteam development (teams
working in different companies)
• Use of only open source software libraries (such as
GPL, LGPL, Apache)
17
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensitivity Points
Trade offs
Risks
Risk Themes
Scenarios
Conceptual Flow of ATAM-Based Architectural Analysis
Analysis
No Quality Attribute Scenario Importance
H: High
M: Moderate
L: Low
Difficulty
H: High
M: Moderate
L: Low
Perf-1 Performance-presentation time Lossless processing of data from IIOT Edge Devices. H H
Cont-1 Availability Server software should be able to work redundant. H H
Intc-1
Interoperability New IIOT Edge devices and Energy Systems can be
integrated to the system through different protocols.
H M
Ext-1 Extensibility
New capabilities can be added to the system and / or existing
services can be closed.
H M
Usab-1 Usability
Monitoring and management with a minimum number of
operators.
M M
Main-1 Maintainability
Providing the recording infrastructure for monitoring of service
error / health etc. status.
M L
18
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensitivity Points
Trade offs
Risks
Risk Themes
Scenarios
Conceptual Flow of ATAM-Based Architectural Analysis
Analysis
Scenario #: Ext-1 | New capabilities can be added to the
system and / or existing services can be closed.
Environment: Maintenance and warranty period
Stimulus: Demand of a new feature
Response Measure: Number of modified services
19
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensitivity Points
Trade offs
Risks
Risk Themes
Scenarios
Conceptual Flow of ATAM-Based Architectural Analysis
AnalysisMicroservices Architecture
RabbitMQ Message Queue
Container Structure
20
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensivity Points
Trade offs
Risks
Risk Themes
Scenarios
Conceptual Flow of ATAM-Based Architectural Analysis
Analysis
Architectural decisions Sensitivity Tradeoff Risks Non-risks
Microservices Architecture
RabbitMQ Message Queue S1
Container Structure
21
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensitivity Points
Trade offs
Risks
Risk Themes
Scenarious
Conceptual Flow of ATAM-Based Architectural Analysis
Analysis
Sensitivity / Compensation / Risk / Non-risk Definition
S1
Pay attention to be no other services
dependent on likely close services
22
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Considering the micro service architecture,
performance, changeability and continuity are
prioritized.
In the upcoming period, more detailed analysis of
the existing scenarios will be made and the
security quality attribute scenarios will be worked
on.
It is aimed to analyze the data stored in the
subsequent stages of the project by techniques
such as deep learning, big data analysis and
machine learning.
Result
23
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
SATURN 2019
Thank You
24
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
SATURN 2019
Other Scenarios &
Overall Architecture Detailed
25
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensivity Points
Trade offs
Risks
Risk Themes
Scenarios
Conceptual Flow of ATAM-Based Architectural Analysis
Analysis
Scenario #: Perf-1 | Lossless processing of data from transformers
Environment: Integrated working environment of the system
Stimulus: Providing data to the system at the prescribed frequency in
the given number of stations
Response Measure: Reference load status for lossless data: A state of
use: 15000 stations, 3500 measuring points per station, average 64
bytes of data from each measuring point (time, type, measurement
value, etc.), update every 10 minutes
26
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensivity Points
Trade offs
Risks
Risk Themes
Scenarios
Conceptual Flow of ATAM-Based Architectural Analysis
AnalysisRecording of data as time
series in the Elasticsearch
Database
Defining device connections,
database registration
mechanism and alarm
generation mechanisms as
Apache Storm topologies
27
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensivity Points
Trade offs
Risks
Risk Themes
Scenarios
Conceptual Flow of ATAM-Based Architectural Analysis
Analysis
Architectural decisions Sensitivity Tradeoff Risks Non-risks
Recording data as time
series to Elasticsearch
database
S1 , S2
Defining device
connections, database
registration mechanism and
alarm generation
mechanisms as Apache
Storm topologies
S3
28
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Business
Drivers
Quality
Attributes
Software
Architecture
Architectural
Approaches
Architectural
Decisions
Non-risks
Sensivity Points
Trade offs
Risks
Risk Themes
Scenarious
Conceptual Flow of ATAM-Based Architectural Analysis
Analysis
Sensitivity / Compensation / Risk / Non-risk Definition
S1 The disk system to be used for efficiently
storing of very high volume of data is also
important.
S2 Similarly, the disk size should be determined
by considering the data recording period.
S3 For performance viewpoint, the most critical
measurement data and the transfer between
modules should be optimized.
29
Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)
Overall Architecture Detailed

More Related Content

What's hot

OIES Best Practices to Deploy M2M applications (short overview)
OIES Best Practices to Deploy M2M applications (short overview)OIES Best Practices to Deploy M2M applications (short overview)
OIES Best Practices to Deploy M2M applications (short overview)Francisco Maroto
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...John M. Willis
 
Strategies to limit project timeline and cost in medical devices
Strategies to limit project timeline and cost in medical devicesStrategies to limit project timeline and cost in medical devices
Strategies to limit project timeline and cost in medical devicesJanel Heilbrunn
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesInductive Automation
 
Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Inductive Automation
 
Fixing SCADA: How Ignition Saves Time
Fixing SCADA: How Ignition Saves TimeFixing SCADA: How Ignition Saves Time
Fixing SCADA: How Ignition Saves TimeInductive Automation
 
Using Software Architecture Principles in Practice
Using Software Architecture Principles in PracticeUsing Software Architecture Principles in Practice
Using Software Architecture Principles in PracticeEoin Woods
 
Touring Tomorrow's Digital Factory
Touring Tomorrow's Digital FactoryTouring Tomorrow's Digital Factory
Touring Tomorrow's Digital FactoryInductive Automation
 

What's hot (11)

OIES Best Practices to Deploy M2M applications (short overview)
OIES Best Practices to Deploy M2M applications (short overview)OIES Best Practices to Deploy M2M applications (short overview)
OIES Best Practices to Deploy M2M applications (short overview)
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...
 
Developing Digital Twins
Developing Digital TwinsDeveloping Digital Twins
Developing Digital Twins
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Strategies to limit project timeline and cost in medical devices
Strategies to limit project timeline and cost in medical devicesStrategies to limit project timeline and cost in medical devices
Strategies to limit project timeline and cost in medical devices
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise Architectures
 
Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016
 
Fixing SCADA: How Ignition Saves Time
Fixing SCADA: How Ignition Saves TimeFixing SCADA: How Ignition Saves Time
Fixing SCADA: How Ignition Saves Time
 
Using Software Architecture Principles in Practice
Using Software Architecture Principles in PracticeUsing Software Architecture Principles in Practice
Using Software Architecture Principles in Practice
 
Security Design Concepts
Security Design ConceptsSecurity Design Concepts
Security Design Concepts
 
Touring Tomorrow's Digital Factory
Touring Tomorrow's Digital FactoryTouring Tomorrow's Digital Factory
Touring Tomorrow's Digital Factory
 

Similar to Developing IIOT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)

IT Architect Profession
IT Architect ProfessionIT Architect Profession
IT Architect ProfessionNugroho Gito
 
Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2Graham Bleakley
 
A Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionA Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionMassimiliano Masi
 
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoT
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoTUtilisation de la plateforme virtuelle QEMU/SystemC pour l'IoT
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoTPôle Systematic Paris-Region
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpseG Innovations
 
Qiang Yu Resume
Qiang Yu Resume Qiang Yu Resume
Qiang Yu Resume Qiang Yu
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2
 
Systematic Architecture Design
Systematic Architecture DesignSystematic Architecture Design
Systematic Architecture DesignGESSI UPC
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMatePECB
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptxJanani S
 
Unit iii-Architecture in the lifecycle
Unit iii-Architecture in the lifecycleUnit iii-Architecture in the lifecycle
Unit iii-Architecture in the lifecycleDhivyaa C.R
 
Iit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gbIit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gbGraham Bleakley
 
Modern Architecture in the Cloud of 2018 (IT Camp 2018)
Modern Architecture in the Cloud of 2018 (IT Camp 2018)Modern Architecture in the Cloud of 2018 (IT Camp 2018)
Modern Architecture in the Cloud of 2018 (IT Camp 2018)Marius Zaharia
 
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster ProjectsRisk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster ProjectsSecureIoT H2020 funded project
 
Presentation on Application of IT in engineering
Presentation on Application of IT in engineeringPresentation on Application of IT in engineering
Presentation on Application of IT in engineeringKarma Chand
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalSyam Madanapalli
 

Similar to Developing IIOT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) (20)

IT Architect Profession
IT Architect ProfessionIT Architect Profession
IT Architect Profession
 
Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2
 
A Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionA Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure Protection
 
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoT
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoTUtilisation de la plateforme virtuelle QEMU/SystemC pour l'IoT
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoT
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
 
Qiang Yu Resume
Qiang Yu Resume Qiang Yu Resume
Qiang Yu Resume
 
AI, ML ,IIOT in steel plant
AI, ML ,IIOT in steel plantAI, ML ,IIOT in steel plant
AI, ML ,IIOT in steel plant
 
Software Architecture in an Agile World
Software Architecture in an Agile WorldSoftware Architecture in an Agile World
Software Architecture in an Agile World
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
 
Systematic Architecture Design
Systematic Architecture DesignSystematic Architecture Design
Systematic Architecture Design
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMate
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
 
Unit iii-Architecture in the lifecycle
Unit iii-Architecture in the lifecycleUnit iii-Architecture in the lifecycle
Unit iii-Architecture in the lifecycle
 
Iit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gbIit 1782 designing for the internet of things (io t) v4 gb
Iit 1782 designing for the internet of things (io t) v4 gb
 
Modern Architecture in the Cloud of 2018 (IT Camp 2018)
Modern Architecture in the Cloud of 2018 (IT Camp 2018)Modern Architecture in the Cloud of 2018 (IT Camp 2018)
Modern Architecture in the Cloud of 2018 (IT Camp 2018)
 
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster ProjectsRisk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
 
lecture 1.pdf
lecture 1.pdflecture 1.pdf
lecture 1.pdf
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Presentation on Application of IT in engineering
Presentation on Application of IT in engineeringPresentation on Application of IT in engineering
Presentation on Application of IT in engineering
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 

Recently uploaded

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 

Recently uploaded (20)

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 

Developing IIOT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method)

  • 1. 1 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) SATURN 2019 Developing IIOT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Sercan Cidem Expert Software Engineer Aselsan
  • 2. 2 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) About me • @sercancidem • Expert Developer at Aselsan • Architecture, DevOps, 8 years of experience • Works on experimenting with the cutting edge of cloud technologies like Kubernetes & Microservices • Interested in the Cloud, Big Data, Iot Technologies and improving company culture
  • 3. 3 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) About Aselsan Inc. • ASELSAN is the largest defense electronics company of Turkey. • Listed as one of the top 100 defense companies of the world (Defense News Top 100). • ASELSAN UGES specialized on IIOT products for Transportation, Security, Energy and Medical systems.
  • 4. 4 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Outline • Introduction • Architectural Design and Analysis • Business Drivers • Quality Attributes, Scenarios and Architectural Analysis • Result
  • 5. 5 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Introduction Product Owner: Aselsan Transportation, Security, Energy and Automation Systems Sector Presidency (UGES) Project: An infrastructure project aimed to control field assets from various domains remotely. (energy, manufacturing, pipeline, etc.) Converting the data received from the remote terminal units on the relevant protocols to the common data model and storing & analyzing of this data Primary Target: Electricity network grid management (Energy Distribution, Generation, Transmission Systems) Project Model: Working with subcontractor for design, software development and execution of tests Project Type: I-Iot Application(Distribution Network-Power grid quality monitoring system), developed for one of the biggest electricity distribution utility in Turkey. (Türkiye - BEDAS)
  • 6. 6 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Endüstriyel Nesnelerin İnterneti Referans Mimarisi Rabbit MQ Devices Sensors Remote Terminal Unit Adapter Topologies Standard Middleware Current Protocol CIM Data ModelCurrent Protocol Web Based User Interface Dashboard Alarm Manager Communication Manager User Manager Topology Docker Swarm Overall Architecture (Implementation Viewpoint)
  • 7. 7 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Software Architectural Design Process
  • 8. 8 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Architecture Tradeoff Analysis Method “The Architecture Tradeoff Analysis Method (ATAM) is a method for evaluating software architectures relative to quality attribute goals. ATAM evaluations expose architectural risks that potentially inhibit the achievement of an organization's business goals” - Software Engineering Institute
  • 9. 9 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) ATAM Process Presentation 1. Present the ATAM 2. Present business drivers 3. Present Architecture Investigation and Analysis 4. Identify Architectural Approaches 5. Generate Quality Attribute Utility Tree 6. Analyze Architectural Approaches Testing 7. Brainstorm and Prioritize Scenarios 8. Analyze Architectural Approaches Reporting 9. Present Results
  • 10. 10 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensitivity Points Trade offs Risks Risk Themes Scenarios Conceptual Flow of ATAM-Based Architectural Analysis Analysis Impacts Distilled into
  • 11. 11 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensitivity Points Trade offs Risks Risk Themes Scenarios Conceptual Flow of ATAM-Based Architectural Analysis • Stakeholders and their Effects on Architecture • Scope of Work • Main Use Cases affecting architecture • Architectural Concerns • Limitations Analysis
  • 12. 12 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensivity Points Trade offs Risks Risk Themes Scenarious Conceptual Flow of ATAM-Based Architectural Analysis • Stakeholders and their Effects on Architecture • Scope of Work • Main Use Cases affecting architecture • Architectural Concerns • Limitations Analysis Aselsan UGES Sector Presidency: • Owns product and architectural design. • Reuse reference architecture in multiple project as an objective, • Determines system requirements, • Creates and directs the architecture, • Technical orientation of software development activities, • Participates in software development activities in certain areas. Subcontractor: • The company conducts architectural design activities with Aselsan, • Develops software. End Customer: • Distribution utility operators, determines user rqmts
  • 13. 13 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensivity Points Trade offs Risks Risk Themes Scenarious Conceptual Flow of ATAM-Based Architectural Analysis • Stakeholders and their Effects on Architecture • Scope of Work • Main Use Cases affecting architecture • Architectural Concerns • Limitations Analysis• All kinds of supply management (energy, natural gas, water, etc.) • First: electricity network grid management (distribution, generation, transmission) • High service availability 🡪 can be used for mission critical systems • A marketable product with interoperable and easy installation • Medium-term online stream analytics (alarm generation) and machine learning
  • 14. 14 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensivity Points Trade offs Risks Risk Themes Scenarious Conceptual Flow of ATAM-Based Architectural Analysis • Stakeholders and their Effects on Architecture • Scope of Work • Main Use Cases affecting architecture • Architectural Concerns • Limitations Analysis UC-1. Real-time display of data UC-2. Saving to the database UC-3. Creation of graphics UC-4. Establishment and display of alarm conditions UC-5 Sending command or configuration data UC-6 Data analytics algorithms operation
  • 15. 15 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensivity Points Trade offs Risks Risk Themes Scenarious Conceptual Flow of ATAM-Based Architectural Analysis • Stakeholders and their Effects on Architecture • Scope of Work • Main Use Cases affecting architecture • Architectural Concerns • Limitations Analysis• Work on both local servers and cloud • Scalability • 7/24 working • Redundant infrastructure • Infrastructure capable of working clustered • Support new protocols on external interfaces • Service error / health etc. monitor their status • Configure different external interfaces and capabilities in projects • Elimination of new software services
  • 16. 16 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensitivity Points Trade offs Risks Risk Themes Scenarios Conceptual Flow of ATAM-Based Architectural Analysis • Stakeholders and their Effects on Architecture • Scope of Work • Main Use Cases affecting architecture • Architectural Concerns • Limitations Analysis • Prototype product within 1 year from the start of the project • The product supports the CIM [14] standard data model • Independent of operating system • Multisite and multiteam development (teams working in different companies) • Use of only open source software libraries (such as GPL, LGPL, Apache)
  • 17. 17 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensitivity Points Trade offs Risks Risk Themes Scenarios Conceptual Flow of ATAM-Based Architectural Analysis Analysis No Quality Attribute Scenario Importance H: High M: Moderate L: Low Difficulty H: High M: Moderate L: Low Perf-1 Performance-presentation time Lossless processing of data from IIOT Edge Devices. H H Cont-1 Availability Server software should be able to work redundant. H H Intc-1 Interoperability New IIOT Edge devices and Energy Systems can be integrated to the system through different protocols. H M Ext-1 Extensibility New capabilities can be added to the system and / or existing services can be closed. H M Usab-1 Usability Monitoring and management with a minimum number of operators. M M Main-1 Maintainability Providing the recording infrastructure for monitoring of service error / health etc. status. M L
  • 18. 18 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensitivity Points Trade offs Risks Risk Themes Scenarios Conceptual Flow of ATAM-Based Architectural Analysis Analysis Scenario #: Ext-1 | New capabilities can be added to the system and / or existing services can be closed. Environment: Maintenance and warranty period Stimulus: Demand of a new feature Response Measure: Number of modified services
  • 19. 19 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensitivity Points Trade offs Risks Risk Themes Scenarios Conceptual Flow of ATAM-Based Architectural Analysis AnalysisMicroservices Architecture RabbitMQ Message Queue Container Structure
  • 20. 20 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensivity Points Trade offs Risks Risk Themes Scenarios Conceptual Flow of ATAM-Based Architectural Analysis Analysis Architectural decisions Sensitivity Tradeoff Risks Non-risks Microservices Architecture RabbitMQ Message Queue S1 Container Structure
  • 21. 21 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensitivity Points Trade offs Risks Risk Themes Scenarious Conceptual Flow of ATAM-Based Architectural Analysis Analysis Sensitivity / Compensation / Risk / Non-risk Definition S1 Pay attention to be no other services dependent on likely close services
  • 22. 22 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Considering the micro service architecture, performance, changeability and continuity are prioritized. In the upcoming period, more detailed analysis of the existing scenarios will be made and the security quality attribute scenarios will be worked on. It is aimed to analyze the data stored in the subsequent stages of the project by techniques such as deep learning, big data analysis and machine learning. Result
  • 23. 23 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) SATURN 2019 Thank You
  • 24. 24 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) SATURN 2019 Other Scenarios & Overall Architecture Detailed
  • 25. 25 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensivity Points Trade offs Risks Risk Themes Scenarios Conceptual Flow of ATAM-Based Architectural Analysis Analysis Scenario #: Perf-1 | Lossless processing of data from transformers Environment: Integrated working environment of the system Stimulus: Providing data to the system at the prescribed frequency in the given number of stations Response Measure: Reference load status for lossless data: A state of use: 15000 stations, 3500 measuring points per station, average 64 bytes of data from each measuring point (time, type, measurement value, etc.), update every 10 minutes
  • 26. 26 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensivity Points Trade offs Risks Risk Themes Scenarios Conceptual Flow of ATAM-Based Architectural Analysis AnalysisRecording of data as time series in the Elasticsearch Database Defining device connections, database registration mechanism and alarm generation mechanisms as Apache Storm topologies
  • 27. 27 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensivity Points Trade offs Risks Risk Themes Scenarios Conceptual Flow of ATAM-Based Architectural Analysis Analysis Architectural decisions Sensitivity Tradeoff Risks Non-risks Recording data as time series to Elasticsearch database S1 , S2 Defining device connections, database registration mechanism and alarm generation mechanisms as Apache Storm topologies S3
  • 28. 28 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Business Drivers Quality Attributes Software Architecture Architectural Approaches Architectural Decisions Non-risks Sensivity Points Trade offs Risks Risk Themes Scenarious Conceptual Flow of ATAM-Based Architectural Analysis Analysis Sensitivity / Compensation / Risk / Non-risk Definition S1 The disk system to be used for efficiently storing of very high volume of data is also important. S2 Similarly, the disk size should be determined by considering the data recording period. S3 For performance viewpoint, the most critical measurement data and the transfer between modules should be optimized.
  • 29. 29 Developing I-IoT System Using Microservices and Its Architectural Evaluation Using ATAM (Architectural Trade Off Method) Overall Architecture Detailed