SlideShare a Scribd company logo
Service Oriented Architecture: 7
SOAD Elements
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Layers in Software Analysis and Design
Service identification and definition
• SOA solution almost always involve integrating
existing legacy systems by decomposing them
into services, operations, business processes, and
business rules
• Existing applications and vendor packages are
factored into sets of discrete services that
represent groups of related operations (bottom-
up approach).
• Business processes and rules are abstracted from
the applications into a separate BPM, managed
by a business choreography model.
Service Decomposition
All OOAD techniques can be applied in
relationship to identifying and defining a service;
however, a higher viewpoint needs to be taken.
Direct and indirect business analysis
• Direct Analysis: BPM and direct requirements
analysis through stakeholder interviews
• Indirect Analysis: When mining for candidate
services, product managers and other business
leaders should be interviewed
• Any existing use case models from non-SOA
projects should also be consulted.
Domain decomposition
• Domain decomposition, subsystem analysis,
goal model creation, and related techniques
are a first promising proposal for a SOA
process structuring method.
• granularityTo select the right level of
abstraction is a key service modeling issue
• Another option is the bundling of several
related services into coarser-grained service
definitions
Naming conventions
• An enterprise-wide naming scheme (XML
namespaces, Java package names, Internet
domains)should be defined.
• A simple example would be to recommend
always assigning a service with a noun, and its
operations with verbs.
• This best practice originates from the OOAD
space
SOAD elements
• Service categorization and aggregation
• Policies and aspects
• Meet-in-the-middle processes
• Semantic brokering
• Service harvesting and knowledge brokering
SOAD elements
• Service categorization and aggregation :Services have
different uses and purpose
– Atomic services can be orchestrated (composed) into
higher level, full-fledged services
• Policies and aspects: A service has syntax, semantics,
and QoS characteristics that all have to be modelled;
• Business traceability is a desirable quality, in addition
to the well-established principle of architectural
traceability
SOAD elements
• Process: meet-in-the-middle:
• The bottom-up approach tends to lead to poor
business-service abstractions in case the
design is dictated by the existing IT
environment, rather than existing and future
business needs.
• On the other hand, top-down processing
might cause insufficient, non-functional
requirement characteristics
SOAD elements
• Semantic brokering: In any SOA context, a
formal interface contract for the invocation
syntax is important.
• The semantics issue (the meaning of
parameters and so forth) has to be solved as
well (domain modeling).
• This is key in any business-to-business (B2B)
and dynamic invocation scenario.
SOAD elements
• Service harvesting and knowledge brokering:
• This is a knowledge management and lifecycle
issue: how can services successfully be prepared
and made available for reuse once they have
been conceptualized?
• Services should be identified and defined with
reuse (and harvesting) as one of the main driving
criteria of the SOA in mind.
• If a component (or service) has no potential for
reuse, then it should probably not be deployed as
a service.
Assignment
• Discuss in Detail the SOAD Elements and their
usage.
• Thank You

More Related Content

What's hot

02 Service Oriented Architecture Series - SOA Concepts
02 Service Oriented Architecture Series - SOA Concepts02 Service Oriented Architecture Series - SOA Concepts
02 Service Oriented Architecture Series - SOA Concepts
Pouria Ghatrenabi
 
Agile User Stories
Agile  User StoriesAgile  User Stories
Agile User Stories
Sunil-QA
 
ITIL® and 5 stages of Service Lifecycle
ITIL® and 5 stages of Service LifecycleITIL® and 5 stages of Service Lifecycle
ITIL® and 5 stages of Service Lifecycle
Multisoft Virtual Academy
 
SOA Modeling Patterns - SOMF
SOA Modeling Patterns - SOMFSOA Modeling Patterns - SOMF
SOA Modeling Patterns - SOMF
Methodologies Corporation
 
ITIL Ayman Hraghi
ITIL Ayman HraghiITIL Ayman Hraghi
ITIL Ayman Hraghi
H'raghi Ayman
 
PMI Presentation2
PMI Presentation2PMI Presentation2
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation Presentation
Wajahat Rajab
 
Business analysis
Business analysis Business analysis
Business analysis
Gautam Kumar
 
Presentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 EnvironmentPresentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 Environment
Vyom Labs
 
Requirements Management
Requirements ManagementRequirements Management
Requirements Management
Lakshmi-BA
 
ITIL(v3): A Beginers Guide
ITIL(v3): A Beginers GuideITIL(v3): A Beginers Guide
ITIL(v3): A Beginers Guide
Md. Rezaul Islam
 
Scanning of Business Analysis
Scanning of Business AnalysisScanning of Business Analysis
Scanning of Business Analysis
TechShiv
 
Process Oriented Architecture
Process Oriented ArchitectureProcess Oriented Architecture
Process Oriented Architecture
Alan McSweeney
 
Business Functional Requirements
Business Functional RequirementsBusiness Functional Requirements
Business Functional Requirements
Sunil-QA
 
ITIL V3 Foundations Chapter1
ITIL V3 Foundations Chapter1ITIL V3 Foundations Chapter1
ITIL V3 Foundations Chapter1
MadMark
 
ITIL Process Assessment - Service Strategy (XLS)
ITIL Process Assessment - Service Strategy (XLS)ITIL Process Assessment - Service Strategy (XLS)
ITIL Process Assessment - Service Strategy (XLS)
Flevy.com Best Practices
 
ITIL V3 Overview
ITIL V3 OverviewITIL V3 Overview
ITIL V3 Overview
Allwyn George
 

What's hot (17)

02 Service Oriented Architecture Series - SOA Concepts
02 Service Oriented Architecture Series - SOA Concepts02 Service Oriented Architecture Series - SOA Concepts
02 Service Oriented Architecture Series - SOA Concepts
 
Agile User Stories
Agile  User StoriesAgile  User Stories
Agile User Stories
 
ITIL® and 5 stages of Service Lifecycle
ITIL® and 5 stages of Service LifecycleITIL® and 5 stages of Service Lifecycle
ITIL® and 5 stages of Service Lifecycle
 
SOA Modeling Patterns - SOMF
SOA Modeling Patterns - SOMFSOA Modeling Patterns - SOMF
SOA Modeling Patterns - SOMF
 
ITIL Ayman Hraghi
ITIL Ayman HraghiITIL Ayman Hraghi
ITIL Ayman Hraghi
 
PMI Presentation2
PMI Presentation2PMI Presentation2
PMI Presentation2
 
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation Presentation
 
Business analysis
Business analysis Business analysis
Business analysis
 
Presentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 EnvironmentPresentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 Environment
 
Requirements Management
Requirements ManagementRequirements Management
Requirements Management
 
ITIL(v3): A Beginers Guide
ITIL(v3): A Beginers GuideITIL(v3): A Beginers Guide
ITIL(v3): A Beginers Guide
 
Scanning of Business Analysis
Scanning of Business AnalysisScanning of Business Analysis
Scanning of Business Analysis
 
Process Oriented Architecture
Process Oriented ArchitectureProcess Oriented Architecture
Process Oriented Architecture
 
Business Functional Requirements
Business Functional RequirementsBusiness Functional Requirements
Business Functional Requirements
 
ITIL V3 Foundations Chapter1
ITIL V3 Foundations Chapter1ITIL V3 Foundations Chapter1
ITIL V3 Foundations Chapter1
 
ITIL Process Assessment - Service Strategy (XLS)
ITIL Process Assessment - Service Strategy (XLS)ITIL Process Assessment - Service Strategy (XLS)
ITIL Process Assessment - Service Strategy (XLS)
 
ITIL V3 Overview
ITIL V3 OverviewITIL V3 Overview
ITIL V3 Overview
 

Similar to Soa 7 soad elements

Soa modeling & bpmn
Soa modeling & bpmnSoa modeling & bpmn
Soa modeling & bpmn
Ayaz Shahid
 
Need a Perfect Blend of EA & SOA - The Open Group Conference
Need a Perfect Blend of EA & SOA - The Open Group ConferenceNeed a Perfect Blend of EA & SOA - The Open Group Conference
Need a Perfect Blend of EA & SOA - The Open Group Conference
Hariharan V Ganesarethinam
 
Service Design Principles and Patterns
Service Design Principles and PatternsService Design Principles and Patterns
Service Design Principles and Patterns
Return on Intelligence
 
Service design principles and patterns
Service design principles and patternsService design principles and patterns
Service design principles and patterns
Return on Intelligence
 
Soa methodology
Soa methodologySoa methodology
Soa methodology
Krishna_in
 
RequirementPro™ Architecture
RequirementPro™ ArchitectureRequirementPro™ Architecture
RequirementPro™ Architecture
Enfocus Solutions Inc.
 
CRM Implementations and Upgrades
CRM Implementations and UpgradesCRM Implementations and Upgrades
CRM Implementations and Upgrades
Peter Ware PMP
 
Soa Next Generation
Soa Next GenerationSoa Next Generation
Soa Next Generation
Mohamed Zakarya Abdelgawad
 
'A View-Based Approach to Quality of Service Modelling in Service-Oriented En...
'A View-Based Approach to Quality of Service Modelling in Service-Oriented En...'A View-Based Approach to Quality of Service Modelling in Service-Oriented En...
'A View-Based Approach to Quality of Service Modelling in Service-Oriented En...
IIBA_Latvia_Chapter
 
Ba course content in mind q systems
Ba course content in mind q systemsBa course content in mind q systems
Ba course content in mind q systems
Mind Q Systems Pvt. Ltd
 
Ba course content in mind q systems
Ba course content in mind q systemsBa course content in mind q systems
Ba course content in mind q systems
Mind Q Systems Pvt. Ltd
 
SOA Next Generation V1.1
SOA Next Generation V1.1SOA Next Generation V1.1
SOA Next Generation V1.1
Mohamed Zakarya Abdelgawad
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmed
saifam
 
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR CLOUD SERVICE PROCESS ARCHITEC...
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR  CLOUD SERVICE PROCESS ARCHITEC...2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR  CLOUD SERVICE PROCESS ARCHITEC...
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR CLOUD SERVICE PROCESS ARCHITEC...
MingXue Wang
 
Asg Path To Optimization1
Asg Path To Optimization1Asg Path To Optimization1
Asg Path To Optimization1
miket60
 
Business Analysis.pptx
Business Analysis.pptxBusiness Analysis.pptx
Business Analysis.pptx
AHM Pervej Kabir
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528
moris lee
 
ITIL Service Design
ITIL Service DesignITIL Service Design
ITIL Service Design
Marvin Sirait
 
Steve Tuppen - Digital Service Management
Steve Tuppen - Digital Service ManagementSteve Tuppen - Digital Service Management
Steve Tuppen - Digital Service Management
itSMF UK
 
SOA - Unit 2 - Service Oriented Architecture
SOA - Unit   2 - Service Oriented ArchitectureSOA - Unit   2 - Service Oriented Architecture
SOA - Unit 2 - Service Oriented Architecture
hamsa nandhini
 

Similar to Soa 7 soad elements (20)

Soa modeling & bpmn
Soa modeling & bpmnSoa modeling & bpmn
Soa modeling & bpmn
 
Need a Perfect Blend of EA & SOA - The Open Group Conference
Need a Perfect Blend of EA & SOA - The Open Group ConferenceNeed a Perfect Blend of EA & SOA - The Open Group Conference
Need a Perfect Blend of EA & SOA - The Open Group Conference
 
Service Design Principles and Patterns
Service Design Principles and PatternsService Design Principles and Patterns
Service Design Principles and Patterns
 
Service design principles and patterns
Service design principles and patternsService design principles and patterns
Service design principles and patterns
 
Soa methodology
Soa methodologySoa methodology
Soa methodology
 
RequirementPro™ Architecture
RequirementPro™ ArchitectureRequirementPro™ Architecture
RequirementPro™ Architecture
 
CRM Implementations and Upgrades
CRM Implementations and UpgradesCRM Implementations and Upgrades
CRM Implementations and Upgrades
 
Soa Next Generation
Soa Next GenerationSoa Next Generation
Soa Next Generation
 
'A View-Based Approach to Quality of Service Modelling in Service-Oriented En...
'A View-Based Approach to Quality of Service Modelling in Service-Oriented En...'A View-Based Approach to Quality of Service Modelling in Service-Oriented En...
'A View-Based Approach to Quality of Service Modelling in Service-Oriented En...
 
Ba course content in mind q systems
Ba course content in mind q systemsBa course content in mind q systems
Ba course content in mind q systems
 
Ba course content in mind q systems
Ba course content in mind q systemsBa course content in mind q systems
Ba course content in mind q systems
 
SOA Next Generation V1.1
SOA Next Generation V1.1SOA Next Generation V1.1
SOA Next Generation V1.1
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmed
 
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR CLOUD SERVICE PROCESS ARCHITEC...
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR  CLOUD SERVICE PROCESS ARCHITEC...2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR  CLOUD SERVICE PROCESS ARCHITEC...
2011, A POLICY BASED GOVERNANCE FRAMEWORK FOR CLOUD SERVICE PROCESS ARCHITEC...
 
Asg Path To Optimization1
Asg Path To Optimization1Asg Path To Optimization1
Asg Path To Optimization1
 
Business Analysis.pptx
Business Analysis.pptxBusiness Analysis.pptx
Business Analysis.pptx
 
BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528BABOK v3 讀書會 CH5 20150528
BABOK v3 讀書會 CH5 20150528
 
ITIL Service Design
ITIL Service DesignITIL Service Design
ITIL Service Design
 
Steve Tuppen - Digital Service Management
Steve Tuppen - Digital Service ManagementSteve Tuppen - Digital Service Management
Steve Tuppen - Digital Service Management
 
SOA - Unit 2 - Service Oriented Architecture
SOA - Unit   2 - Service Oriented ArchitectureSOA - Unit   2 - Service Oriented Architecture
SOA - Unit 2 - Service Oriented Architecture
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
Maitrey Patel
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
Severalnines
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
Envertis Software Solutions
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
sjcobrien
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
Karya Keeper
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 

Recently uploaded (20)

GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 

Soa 7 soad elements

  • 1. Service Oriented Architecture: 7 SOAD Elements Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Layers in Software Analysis and Design
  • 3. Service identification and definition • SOA solution almost always involve integrating existing legacy systems by decomposing them into services, operations, business processes, and business rules • Existing applications and vendor packages are factored into sets of discrete services that represent groups of related operations (bottom- up approach). • Business processes and rules are abstracted from the applications into a separate BPM, managed by a business choreography model.
  • 4. Service Decomposition All OOAD techniques can be applied in relationship to identifying and defining a service; however, a higher viewpoint needs to be taken.
  • 5. Direct and indirect business analysis • Direct Analysis: BPM and direct requirements analysis through stakeholder interviews • Indirect Analysis: When mining for candidate services, product managers and other business leaders should be interviewed • Any existing use case models from non-SOA projects should also be consulted.
  • 6. Domain decomposition • Domain decomposition, subsystem analysis, goal model creation, and related techniques are a first promising proposal for a SOA process structuring method. • granularityTo select the right level of abstraction is a key service modeling issue • Another option is the bundling of several related services into coarser-grained service definitions
  • 7. Naming conventions • An enterprise-wide naming scheme (XML namespaces, Java package names, Internet domains)should be defined. • A simple example would be to recommend always assigning a service with a noun, and its operations with verbs. • This best practice originates from the OOAD space
  • 8. SOAD elements • Service categorization and aggregation • Policies and aspects • Meet-in-the-middle processes • Semantic brokering • Service harvesting and knowledge brokering
  • 9. SOAD elements • Service categorization and aggregation :Services have different uses and purpose – Atomic services can be orchestrated (composed) into higher level, full-fledged services • Policies and aspects: A service has syntax, semantics, and QoS characteristics that all have to be modelled; • Business traceability is a desirable quality, in addition to the well-established principle of architectural traceability
  • 10. SOAD elements • Process: meet-in-the-middle: • The bottom-up approach tends to lead to poor business-service abstractions in case the design is dictated by the existing IT environment, rather than existing and future business needs. • On the other hand, top-down processing might cause insufficient, non-functional requirement characteristics
  • 11. SOAD elements • Semantic brokering: In any SOA context, a formal interface contract for the invocation syntax is important. • The semantics issue (the meaning of parameters and so forth) has to be solved as well (domain modeling). • This is key in any business-to-business (B2B) and dynamic invocation scenario.
  • 12. SOAD elements • Service harvesting and knowledge brokering: • This is a knowledge management and lifecycle issue: how can services successfully be prepared and made available for reuse once they have been conceptualized? • Services should be identified and defined with reuse (and harvesting) as one of the main driving criteria of the SOA in mind. • If a component (or service) has no potential for reuse, then it should probably not be deployed as a service.
  • 13. Assignment • Discuss in Detail the SOAD Elements and their usage. • Thank You