SlideShare a Scribd company logo
1 of 4
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 01 June 2012 Page No.1-4
ISSN: 2278-2389
1
Study on Use Case Model for Service Oriented
Architecture Development
N.Sasikala, K.Rangarajan
Reseach Scholor, MTWU
Hod,Dept.of Mca,Bharath University.
Abstract- The recent trends in the computer industry are the one
and only thing i.e., web services. Because of the common
availability and open technologies web services are relevant to
all. Service-oriented architecture (SOA) helps organizations to
transform their business processes for high performance by
simplifying the underlying information systems. The most
challenging aspect of building successful software applications is
clearly understanding and specifying the requirements that an
application must satisfy. Use case modeling is an increasingly
popular approach for identifying and defining requirements for
software applications of all types. Use cases describe the
behavior of the system as its users interact with it. This approach
helps to place the software requirements in the framework of a
user doing some useful work with the system. This type of
approach helps to map software requirements to the relevant end-
user business processes, a very powerful concept. This paper
presents how the relationship between use case model and
Service oriented architecture.
Index Terms—Service Oriented Architecture, Component Based
Architecture, SOA entities, SOA characteristics, Use cases,
Relationships
I. INTRODUCTION TO SOA
Companies are inneed to integrate existing systems in order to
implement information technology (IT) support for their business
processes which cover all present and prospective systems
requirements needed to run the business end-to-end. A variety of
designs serve this kind of service ranging from rigid point-to-
point electronic data interchange (EDI) interactions to web
auctions. This will be donr by updating older technologies, for
example by Internet-enabling EDI-based systems, companies can
make their IT systems available to internal or external customers;
but the resulting systems have not proven flexible enough to
meet business demands, which require a flexible, standardized
architecture to better support the connection of various
applications and the sharing of data.SOA offers one such
prospective architecture. It unifies business processes by
structuring large applications as an ad hoc collection of smaller
modules called "services".
Service Oriented Architecture (SOA) can be defined as an
evolution of the Component Based Architecture, Interface Based
Design (Object Oriented) and Distributed Systems. A
Component Based Architecture is an architecture where the
functionality of the whole is divided into smaller functions, each
encapsulated in a component. A Distributed System is an
extension of components-based architecture and refers to
components that may exist in different physical locations.This
paper is organized as follows: Section 2 describes about the SOA
entities and its description.It also talks about the guiding
principles for the development, maintenance, and usage of the
SOA. Section 3 describes the necessity for software employees
to adopt SOA and the benefits which they can gain .Section 4
demonstrates about the use cases and its benefits of use cases.
Section 5 describes two different examples to talk about the
relationships between the use cases and SOA. Conclusions are
presented in Section 7.
II. SOA ENTITIES
SOA consists of the following six entities configured together to
support the find, bind, and execute paradigm The “find, bind, and
execute” paradigm as shown in Figure1 allows the consumer of a
service to ask a third-party registry for the service that matches
its criteria. If the registry has such a service, it gives the
consumer a contract and an endpoint address for the service
Figure 1:
Find
Bind and Execute
Register
Service Consumer
The service consumer is an application, service, or some other
type of software module that requires a service. It is the entity
that initiates the locating of the service in the registry, binding to
the service over a transport, and executing the service function.
The service consumer executes the service by sending it a
request formatted according to the contract.
Service Provider
The service provider is the service, that the network-addressable
entity that accepts and executes requests from consumers. It can
be a mainframe system, a component, or some other type of
software system that executes the service request. The service
Service
consumer
Registry
Contract
Service Provider
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 01 June 2012 Page No.1-4
ISSN: 2278-2389
2
provider publishes its contract in the registry for access by
service consumers.
Service Registry
A service registry is a network-based directory that contains
available services. It is an entity that accepts and stores contracts
from service providers and provides those contracts to interested
service consumers.
Service Contract
A contract is a specification of the way a consumer of a service
will interact with the provider of the service. It specifies the
format of the request and response from the service. A service
contract may require a set of preconditions and postconditions.
The preconditions and postconditions specify the state that the
service must be in to execute a particular function. The contract
may also specify quality of service (QoS) levels. QoS levels are
specifications for the nonfunctional aspects of the service. For
instance, a quality of service attribute is the amount of time it
takes to execute a service method.
Service Proxy
The service provider supplies a service proxy to the service
consumer. The service consumer executes the request by calling
an API function on the proxy. It then formats the request
message and executes the request on behalf of the consumer. The
service proxy is a convenience entity for the service
consumer.The service proxy can enhance performance by
caching remote references and data.When a proxy caches a
remote reference, subsequent service calls will not require
additional registry calls. By storing service contracts locally, the
consumer reduces the number of network hops required to
execute the service.
Service Lease
The service lease, which the registry grants the service
consumer, specifies the amount of time the contract is valid: only
from the time the consumer requests it from the registry to the
time specified by the lease (Sun Microsystems, Jini Technology
Core Specification, 2001). When the lease runs out, the
consumer must request a new lease from the registry.The lease is
necessary for services that need to maintain state information
about the binding between the consumer and provider. The lease
defines the time for which the state may be maintained
2.1 Principles
The following guiding principles define the ground rules for
development, maintenance, and usage of the SOA:
 Reuse, granularity, modularity, composability,
componentization, portability, and interoperability
 Standards compliance (both common and industry-
specific)
 Services identification and categorization, provisioning
and delivery, and monitoring and tracking
III. ESSENTIAL NEED FOR THE ADOPTION OF
SOA
In general the Information Technology (IT) workers face many
challenges like,
 Limited budgets for the modeling system.
 Constantly changing technologies.
 Evolving technologies for the same business function.
 Business requirements that demand applications and
technology silos that need to be integrated with each
other.
 Application functionality that must be extended to
reach outside an enterprise firewall
By these factors we can come for the conclusion that the system
require integration. For example, when a core banking system
must be accessed and used by customers through the Internet, a
demand is placed on the system to expose some of its
functionality to the application that drives the Internet access.If
the integration is always in native format (specific to an
application’s programming language or environment), then
integration projects will require a lot of custom integration work.
In addition, the ability to connect multiple systems together
quickly will require highly specialized programming capabilities
and knowledge of the nuances of the individual systems.
Because each enterprise application may be implemented on a
single server that provides the same functionality to many
clients, it makes sense to use common protocols to access the
functionality. IT staff can lower costs dramatically by using
common protocols and standards, and common methodologies
such as SOA.
Figure 2 shows the distinct philosophies of each step that
business has taken to adapt to requirements integration:
1. Vertical silos of integration – keeping all applications and
systems with similar functionality integrated with each other, but
not accounting for applications that may wish to use their core
functionality in the future.
2. Horizontal integration – integration of some but not all similar
functionality across vertical systems; for example using a
common purchasing system for raw materials, shipping needs
and office supplies.
3. The SOA – an environment of ubiquitous service providers
and service consumers interoperating with each other in a secure
and consistent manner.
Figure 2: Business views of system integration
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 01 June 2012 Page No.1-4
ISSN: 2278-2389
3
Many IT workers are placing requirements for this type of
integration on their software vendors. Most of the large and
medium-sized software vendors have either announced or
incorporated SOA methodology in their software.While the basic
patterns of integration remain the same, the specific technology
to implement it does vary, depending largely on the software
vendor.While the technical barriers to integration are easy to
overcome, there are vastly differing business policies and legal
aspects to be enforced at runtime, but no widely accepted
standards exist for them yet. Many software vendors continue to
pursue different methodologies and individual solutions for these
components of the SOA.
IV. USE CASES
Use cases are a powerful technique for capturing and
communicating functional requirements for software
development. A use case describes a set of possible executions of
the system. It describes a complete flow through the system until
the resulting value is achieved for some actor. I can be described
as follows:
• “Sequence of actions”: Atomic activities, decisions, and
requests. Each action is performed fully or not at all.
• “Performed by a system”: The actions performed by the
system are the functional requirements.
• “Observable result of value”: Make sure that the use case
results in an observable value. Why would anybody use the
system if it does not achieve a result of value? If nobody receives
value from the use case, then the use case is probably too small.
It needs to be combined with other use cases to provide a
complete set of steps for achieving some goal for an actor.
• “To an actor”: Decide which particular actor receives the
value and helps avoid use from declarative statements in two
primary ways. They describe functional requirements from the
user perspective rather than the system perspective, and they
provide a coherent goal focused flow of events rather than a set
of discrete declarative statements.
V. RELATIONSHIP BETWEEN SOA AND
USECASE MODEL
In formulating an SOA, we can start with operation. Here the
focus is how end users, systems, or applications use services.
Use cases in Unified Modeling Language (UML) [5] describe the
external behavior of a service as seen or utilized by an actor
(user, system, or application). The boundary of the service in a
use case is clearly delineated. The interaction of the actor with
the service is described without revealing the internal details of
the service. Use case is, therefore, a natural tool for describing
operational activities in an SOA.Based on the operational
concept, the scope of services, and the high-level requirements,
one may identify a set of high-level critical use cases. These are
the use cases that the architecture must support to meet the
minimal requirements. Use cases are not requirements.
Nevertheless, they illustrate what functions architecture provides
and highlight the requirements. Therefore, use cases are the first
step in formulating an SOA (see Figure 3).
Figure 3: Formulating an SOA
In each use case, typically two or more nodes interact with each
other by exchanging information. If a node is a service
consumer, then it is an actor in the use case for that service. If it
is a provider, then it is a component providing that service.
Traditionally, a node in the C4ISR framework represents a role,
an organization, an operational facility, etc. For an SOA, its
scope is expanded to include shared resources and services.
Hence a service node interacts with consumer nodes to provide
services. Use case and node are, therefore, the primary objects in
describing the operational aspects of an SOA, as shown in Figure
3.
Once the operational aspects are identified, the next action is to
find the solution that satisfies the operational requirements. In an
SOA, each service provides a set of well-defined functions useful
to its users, or consumers.
5.1 Operational View
let us consider an enterprise messaging system, in Command,
Control, Communications, Computers, Intelligence,
Surveillance, and Reconnaissance (C4ISR), which encompasses
e-mail, instant messaging (IM), chat, and presence services. The
critical use cases are send and receive emails and instant
messages, participate in a chat session, subscribe to and receive
presence notifications, etc. They are shown in the use case
diagram in Figure 4. In addition, the administrator configures
and administers the services
Figure 4: Use Cases as Part of the Activity Model for the
Enterprise Messaging System
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 01 June 2012 Page No.1-4
ISSN: 2278-2389
4
For each use case, you may describe a sequence of events or
activities. These activities may be presented in a hierarchy, as in
the standard activity model operational view .Here, however, the
use cases provide a natural grouping of those related activities.
Additionally, a use case highlights the actors and system/service
boundary, allowing you to delineate roles and nodes easily.
Hence, include use case as part of OV and consider it an
essential product for an SOA.
For an SOA, the use-case diagrams (such as Figure 4) often
identify the nodes. These nodes are roles, organizations, shared
resources, or service nodes. You can further draw the
connections (i.e., the need lines) between the nodes, thereby
forming the operational node connectivity description (OV). An
example is given in Figure 5.
Figure 5: Operational Node Connectivity Description for the
Enterprise Messaging System
Using UML techniques to supplement the traditional C4ISR
framework, I have elucidated an approach for formulating an
SOA. On the operational side, it starts with use cases, which
involve the interaction of two or more operational or service
nodes. Mission functions are provided through applications,
which are implemented by a set of services. The high-level
operational concept graphics still applies to an SOA. This,
operational views together encompasses the concepts of
operation, the use cases from user's viewpoint, the connectivity
between operational nodes, and their information exchanges.
They therefore characterize the essential operational aspects of
an SOA. Furthermore, since operational nodes include shared
resources and services, dynamic and collaborative operational
activities are properly captured
VI. CONCLUSIONS
By this paper I can also conclude that well-written use case
descriptions are a powerful technique for capturing and
communicating functional requirements in many software
development paradigms. In fact, many software development
organizations have adopted use case techniques for their
requirements management efforts on projects that are not object
oriented or using any other UML constructs. SOA is based on
the use of distributed objects and components and is the next
evolutionary step in computing environments. An SOA may also
implement optional concepts that include a service consumer, a
service client, acceptance of the service contract and invoking
the service.There are many business drivers affecting the
development of a standardized SOA reference model. Once this
is achieved, SOA will likely be part of the solution for many
business and world issues. They are by no means a silver bullet
for requirements and UI design, and they certainly have their
pitfalls, but overall they can be a powerful tool for most projects.
The secret is to keep it simple, and to involve the users right the
way along in the identification and design of use cases.
Remember that our aim is to eliminate rework due to
requirements misunderstandings, and so we should be aiming to
reach a point where there are no surprises for the users. Use
cases, in conjunction with SOA techniques help to build an
explicit shared understanding that everyone can take away with
them . users, developers, testers, technical authors, and others.
REFERENCES
[1] Bieber, G., and Carpenter, J. Introduction to Service-Oriented
Programming (Rev 2.1).
[2] www.openwings.org/download/specs/ServiceOrientedIntroduction.pdf,
accessed October 2002.
[3] Fowler, M. UML Distilled: Applying the Standard Object Modeling
Language.Addison-Wesley, 1997.
[4] Meyer, B. Object Oriented Software Construction. Prentice Hall, 1997,
pp. 39–48.
[5] Arsanjani, A.: Service-Oriented Modelling and Architecture (SOMA),
IBM developer-Works 2004,
[6] http://www.ibm.com/developerworks/webservices/library/ws-soa-design1
[7] Bass, L.; Clements, P.; Kazman, R.: Software Architecture in Practice,
Addison Wesley, 1998.
[8] [BRJ99] Booch, G.; Rumbaugh, J.; Jacobson, I.: The Unified Modeling
Language User Guide,1999
[9] Johnston, S.: UML 2.0 Profile for Software Services, IBM
developerWorks 2005,
[10] Zimmermann, O.; Milinski, M.; Craes, M.; Oellermann, F.: Second
Generation Web Services-Oriented Architecture in Production in the
Finance Industry, OOPSLA Conference Companion, 2004
[11] Zimmermann, O.; Doubrovski, V.; Grundler, J.; Hogg, K.: Service-
Oriented Architecture and Business Process Choreography in an Order
Management Scenario, OOPSLA Conference Companion, 2005
[12] U.S. Joint Forces Command. Global Information Grid Capstone
Requirements Document. JROCM 134-01. Norfolk, VA: USJFCOM,
Aug. 2001 https://jdl.jwfc.jfcom.mil/.
[13] C4ISR Architecture Working Group. C4ISR Architecture Framework
Vers. 2.0. Washington, D.C.: Department of Defense, 18 Dec. 1997
[14] www.fas.org/irp/program/core/fw.pdf. The next version is the DoD
Architecture Framework Vers. 1.0. 15 Aug. 2003 www.aitcnet.org/dodfw

More Related Content

Similar to Study on Use Case Model for Service Oriented Architecture Development

Performance Prediction of Service-Oriented Architecture - A survey
Performance Prediction of Service-Oriented Architecture - A surveyPerformance Prediction of Service-Oriented Architecture - A survey
Performance Prediction of Service-Oriented Architecture - A surveyEditor IJCATR
 
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptNKannanCSE
 
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
 
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASMULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASijseajournal
 
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMS
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMSA SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMS
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMSijitcs
 
Cluster based approach for Service Discovery using Pattern Recognition
Cluster based approach for Service Discovery using Pattern RecognitionCluster based approach for Service Discovery using Pattern Recognition
Cluster based approach for Service Discovery using Pattern RecognitionYogesh Santhan
 
Dynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented SoftwareDynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented SoftwareMadjid KETFI
 
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...Yogesh Santhan
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White PaperBrian Hedstrom
 
Formalization of SOA concepts with mathematical foundation
Formalization of SOA concepts with mathematical foundation Formalization of SOA concepts with mathematical foundation
Formalization of SOA concepts with mathematical foundation IJECEIAES
 
Enhancement in Web Service Architecture
Enhancement in Web Service ArchitectureEnhancement in Web Service Architecture
Enhancement in Web Service ArchitectureIJERA Editor
 
Lectura 2.3 soa-overview-directions-benatallah
Lectura 2.3   soa-overview-directions-benatallahLectura 2.3   soa-overview-directions-benatallah
Lectura 2.3 soa-overview-directions-benatallahMatias Menendez
 
Service oriented architecture & web 2.0
Service oriented architecture & web 2.0Service oriented architecture & web 2.0
Service oriented architecture & web 2.0Abhik Tushar Das
 
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEM
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEMMETRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEM
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEMijseajournal
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft MimarisiNuri Cankaya
 

Similar to Study on Use Case Model for Service Oriented Architecture Development (20)

Performance Prediction of Service-Oriented Architecture - A survey
Performance Prediction of Service-Oriented Architecture - A surveyPerformance Prediction of Service-Oriented Architecture - A survey
Performance Prediction of Service-Oriented Architecture - A survey
 
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
 
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
 
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASMULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
 
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMS
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMSA SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMS
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMS
 
Cluster based approach for Service Discovery using Pattern Recognition
Cluster based approach for Service Discovery using Pattern RecognitionCluster based approach for Service Discovery using Pattern Recognition
Cluster based approach for Service Discovery using Pattern Recognition
 
Performance in soa context
Performance in soa contextPerformance in soa context
Performance in soa context
 
Unit III.ppt
Unit III.pptUnit III.ppt
Unit III.ppt
 
Dynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented SoftwareDynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented Software
 
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
 
Refactoring to Microservice Architecture
Refactoring to Microservice ArchitectureRefactoring to Microservice Architecture
Refactoring to Microservice Architecture
 
Formalization of SOA concepts with mathematical foundation
Formalization of SOA concepts with mathematical foundation Formalization of SOA concepts with mathematical foundation
Formalization of SOA concepts with mathematical foundation
 
Enhancement in Web Service Architecture
Enhancement in Web Service ArchitectureEnhancement in Web Service Architecture
Enhancement in Web Service Architecture
 
Lectura 2.3 soa-overview-directions-benatallah
Lectura 2.3   soa-overview-directions-benatallahLectura 2.3   soa-overview-directions-benatallah
Lectura 2.3 soa-overview-directions-benatallah
 
Service oriented architecture & web 2.0
Service oriented architecture & web 2.0Service oriented architecture & web 2.0
Service oriented architecture & web 2.0
 
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEM
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEMMETRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEM
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEM
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft Mimarisi
 

More from ijbuiiir1

Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometricsijbuiiir1
 
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...ijbuiiir1
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter DataApplying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter Dataijbuiiir1
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobileijbuiiir1
 
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...ijbuiiir1
 
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image DenoisingA Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image Denoisingijbuiiir1
 
A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...ijbuiiir1
 
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...ijbuiiir1
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM ModelEnhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Modelijbuiiir1
 
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...ijbuiiir1
 
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networksijbuiiir1
 
Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...ijbuiiir1
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
 
Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...ijbuiiir1
 
Wireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeWireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeijbuiiir1
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet TransformImage Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transformijbuiiir1
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERPijbuiiir1
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soaijbuiiir1
 

More from ijbuiiir1 (20)

Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter DataApplying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobile
 
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
 
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image DenoisingA Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
 
A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...
 
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM ModelEnhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
 
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
 
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networks
 
Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Network
 
Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...
 
Wireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeWireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBee
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet TransformImage Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERP
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soa
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Study on Use Case Model for Service Oriented Architecture Development

  • 1. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 01 Issue: 01 June 2012 Page No.1-4 ISSN: 2278-2389 1 Study on Use Case Model for Service Oriented Architecture Development N.Sasikala, K.Rangarajan Reseach Scholor, MTWU Hod,Dept.of Mca,Bharath University. Abstract- The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant end- user business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture. Index Terms—Service Oriented Architecture, Component Based Architecture, SOA entities, SOA characteristics, Use cases, Relationships I. INTRODUCTION TO SOA Companies are inneed to integrate existing systems in order to implement information technology (IT) support for their business processes which cover all present and prospective systems requirements needed to run the business end-to-end. A variety of designs serve this kind of service ranging from rigid point-to- point electronic data interchange (EDI) interactions to web auctions. This will be donr by updating older technologies, for example by Internet-enabling EDI-based systems, companies can make their IT systems available to internal or external customers; but the resulting systems have not proven flexible enough to meet business demands, which require a flexible, standardized architecture to better support the connection of various applications and the sharing of data.SOA offers one such prospective architecture. It unifies business processes by structuring large applications as an ad hoc collection of smaller modules called "services". Service Oriented Architecture (SOA) can be defined as an evolution of the Component Based Architecture, Interface Based Design (Object Oriented) and Distributed Systems. A Component Based Architecture is an architecture where the functionality of the whole is divided into smaller functions, each encapsulated in a component. A Distributed System is an extension of components-based architecture and refers to components that may exist in different physical locations.This paper is organized as follows: Section 2 describes about the SOA entities and its description.It also talks about the guiding principles for the development, maintenance, and usage of the SOA. Section 3 describes the necessity for software employees to adopt SOA and the benefits which they can gain .Section 4 demonstrates about the use cases and its benefits of use cases. Section 5 describes two different examples to talk about the relationships between the use cases and SOA. Conclusions are presented in Section 7. II. SOA ENTITIES SOA consists of the following six entities configured together to support the find, bind, and execute paradigm The “find, bind, and execute” paradigm as shown in Figure1 allows the consumer of a service to ask a third-party registry for the service that matches its criteria. If the registry has such a service, it gives the consumer a contract and an endpoint address for the service Figure 1: Find Bind and Execute Register Service Consumer The service consumer is an application, service, or some other type of software module that requires a service. It is the entity that initiates the locating of the service in the registry, binding to the service over a transport, and executing the service function. The service consumer executes the service by sending it a request formatted according to the contract. Service Provider The service provider is the service, that the network-addressable entity that accepts and executes requests from consumers. It can be a mainframe system, a component, or some other type of software system that executes the service request. The service Service consumer Registry Contract Service Provider
  • 2. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 01 Issue: 01 June 2012 Page No.1-4 ISSN: 2278-2389 2 provider publishes its contract in the registry for access by service consumers. Service Registry A service registry is a network-based directory that contains available services. It is an entity that accepts and stores contracts from service providers and provides those contracts to interested service consumers. Service Contract A contract is a specification of the way a consumer of a service will interact with the provider of the service. It specifies the format of the request and response from the service. A service contract may require a set of preconditions and postconditions. The preconditions and postconditions specify the state that the service must be in to execute a particular function. The contract may also specify quality of service (QoS) levels. QoS levels are specifications for the nonfunctional aspects of the service. For instance, a quality of service attribute is the amount of time it takes to execute a service method. Service Proxy The service provider supplies a service proxy to the service consumer. The service consumer executes the request by calling an API function on the proxy. It then formats the request message and executes the request on behalf of the consumer. The service proxy is a convenience entity for the service consumer.The service proxy can enhance performance by caching remote references and data.When a proxy caches a remote reference, subsequent service calls will not require additional registry calls. By storing service contracts locally, the consumer reduces the number of network hops required to execute the service. Service Lease The service lease, which the registry grants the service consumer, specifies the amount of time the contract is valid: only from the time the consumer requests it from the registry to the time specified by the lease (Sun Microsystems, Jini Technology Core Specification, 2001). When the lease runs out, the consumer must request a new lease from the registry.The lease is necessary for services that need to maintain state information about the binding between the consumer and provider. The lease defines the time for which the state may be maintained 2.1 Principles The following guiding principles define the ground rules for development, maintenance, and usage of the SOA:  Reuse, granularity, modularity, composability, componentization, portability, and interoperability  Standards compliance (both common and industry- specific)  Services identification and categorization, provisioning and delivery, and monitoring and tracking III. ESSENTIAL NEED FOR THE ADOPTION OF SOA In general the Information Technology (IT) workers face many challenges like,  Limited budgets for the modeling system.  Constantly changing technologies.  Evolving technologies for the same business function.  Business requirements that demand applications and technology silos that need to be integrated with each other.  Application functionality that must be extended to reach outside an enterprise firewall By these factors we can come for the conclusion that the system require integration. For example, when a core banking system must be accessed and used by customers through the Internet, a demand is placed on the system to expose some of its functionality to the application that drives the Internet access.If the integration is always in native format (specific to an application’s programming language or environment), then integration projects will require a lot of custom integration work. In addition, the ability to connect multiple systems together quickly will require highly specialized programming capabilities and knowledge of the nuances of the individual systems. Because each enterprise application may be implemented on a single server that provides the same functionality to many clients, it makes sense to use common protocols to access the functionality. IT staff can lower costs dramatically by using common protocols and standards, and common methodologies such as SOA. Figure 2 shows the distinct philosophies of each step that business has taken to adapt to requirements integration: 1. Vertical silos of integration – keeping all applications and systems with similar functionality integrated with each other, but not accounting for applications that may wish to use their core functionality in the future. 2. Horizontal integration – integration of some but not all similar functionality across vertical systems; for example using a common purchasing system for raw materials, shipping needs and office supplies. 3. The SOA – an environment of ubiquitous service providers and service consumers interoperating with each other in a secure and consistent manner. Figure 2: Business views of system integration
  • 3. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 01 Issue: 01 June 2012 Page No.1-4 ISSN: 2278-2389 3 Many IT workers are placing requirements for this type of integration on their software vendors. Most of the large and medium-sized software vendors have either announced or incorporated SOA methodology in their software.While the basic patterns of integration remain the same, the specific technology to implement it does vary, depending largely on the software vendor.While the technical barriers to integration are easy to overcome, there are vastly differing business policies and legal aspects to be enforced at runtime, but no widely accepted standards exist for them yet. Many software vendors continue to pursue different methodologies and individual solutions for these components of the SOA. IV. USE CASES Use cases are a powerful technique for capturing and communicating functional requirements for software development. A use case describes a set of possible executions of the system. It describes a complete flow through the system until the resulting value is achieved for some actor. I can be described as follows: • “Sequence of actions”: Atomic activities, decisions, and requests. Each action is performed fully or not at all. • “Performed by a system”: The actions performed by the system are the functional requirements. • “Observable result of value”: Make sure that the use case results in an observable value. Why would anybody use the system if it does not achieve a result of value? If nobody receives value from the use case, then the use case is probably too small. It needs to be combined with other use cases to provide a complete set of steps for achieving some goal for an actor. • “To an actor”: Decide which particular actor receives the value and helps avoid use from declarative statements in two primary ways. They describe functional requirements from the user perspective rather than the system perspective, and they provide a coherent goal focused flow of events rather than a set of discrete declarative statements. V. RELATIONSHIP BETWEEN SOA AND USECASE MODEL In formulating an SOA, we can start with operation. Here the focus is how end users, systems, or applications use services. Use cases in Unified Modeling Language (UML) [5] describe the external behavior of a service as seen or utilized by an actor (user, system, or application). The boundary of the service in a use case is clearly delineated. The interaction of the actor with the service is described without revealing the internal details of the service. Use case is, therefore, a natural tool for describing operational activities in an SOA.Based on the operational concept, the scope of services, and the high-level requirements, one may identify a set of high-level critical use cases. These are the use cases that the architecture must support to meet the minimal requirements. Use cases are not requirements. Nevertheless, they illustrate what functions architecture provides and highlight the requirements. Therefore, use cases are the first step in formulating an SOA (see Figure 3). Figure 3: Formulating an SOA In each use case, typically two or more nodes interact with each other by exchanging information. If a node is a service consumer, then it is an actor in the use case for that service. If it is a provider, then it is a component providing that service. Traditionally, a node in the C4ISR framework represents a role, an organization, an operational facility, etc. For an SOA, its scope is expanded to include shared resources and services. Hence a service node interacts with consumer nodes to provide services. Use case and node are, therefore, the primary objects in describing the operational aspects of an SOA, as shown in Figure 3. Once the operational aspects are identified, the next action is to find the solution that satisfies the operational requirements. In an SOA, each service provides a set of well-defined functions useful to its users, or consumers. 5.1 Operational View let us consider an enterprise messaging system, in Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR), which encompasses e-mail, instant messaging (IM), chat, and presence services. The critical use cases are send and receive emails and instant messages, participate in a chat session, subscribe to and receive presence notifications, etc. They are shown in the use case diagram in Figure 4. In addition, the administrator configures and administers the services Figure 4: Use Cases as Part of the Activity Model for the Enterprise Messaging System
  • 4. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 01 Issue: 01 June 2012 Page No.1-4 ISSN: 2278-2389 4 For each use case, you may describe a sequence of events or activities. These activities may be presented in a hierarchy, as in the standard activity model operational view .Here, however, the use cases provide a natural grouping of those related activities. Additionally, a use case highlights the actors and system/service boundary, allowing you to delineate roles and nodes easily. Hence, include use case as part of OV and consider it an essential product for an SOA. For an SOA, the use-case diagrams (such as Figure 4) often identify the nodes. These nodes are roles, organizations, shared resources, or service nodes. You can further draw the connections (i.e., the need lines) between the nodes, thereby forming the operational node connectivity description (OV). An example is given in Figure 5. Figure 5: Operational Node Connectivity Description for the Enterprise Messaging System Using UML techniques to supplement the traditional C4ISR framework, I have elucidated an approach for formulating an SOA. On the operational side, it starts with use cases, which involve the interaction of two or more operational or service nodes. Mission functions are provided through applications, which are implemented by a set of services. The high-level operational concept graphics still applies to an SOA. This, operational views together encompasses the concepts of operation, the use cases from user's viewpoint, the connectivity between operational nodes, and their information exchanges. They therefore characterize the essential operational aspects of an SOA. Furthermore, since operational nodes include shared resources and services, dynamic and collaborative operational activities are properly captured VI. CONCLUSIONS By this paper I can also conclude that well-written use case descriptions are a powerful technique for capturing and communicating functional requirements in many software development paradigms. In fact, many software development organizations have adopted use case techniques for their requirements management efforts on projects that are not object oriented or using any other UML constructs. SOA is based on the use of distributed objects and components and is the next evolutionary step in computing environments. An SOA may also implement optional concepts that include a service consumer, a service client, acceptance of the service contract and invoking the service.There are many business drivers affecting the development of a standardized SOA reference model. Once this is achieved, SOA will likely be part of the solution for many business and world issues. They are by no means a silver bullet for requirements and UI design, and they certainly have their pitfalls, but overall they can be a powerful tool for most projects. The secret is to keep it simple, and to involve the users right the way along in the identification and design of use cases. Remember that our aim is to eliminate rework due to requirements misunderstandings, and so we should be aiming to reach a point where there are no surprises for the users. Use cases, in conjunction with SOA techniques help to build an explicit shared understanding that everyone can take away with them . users, developers, testers, technical authors, and others. REFERENCES [1] Bieber, G., and Carpenter, J. Introduction to Service-Oriented Programming (Rev 2.1). [2] www.openwings.org/download/specs/ServiceOrientedIntroduction.pdf, accessed October 2002. [3] Fowler, M. UML Distilled: Applying the Standard Object Modeling Language.Addison-Wesley, 1997. [4] Meyer, B. Object Oriented Software Construction. Prentice Hall, 1997, pp. 39–48. [5] Arsanjani, A.: Service-Oriented Modelling and Architecture (SOMA), IBM developer-Works 2004, [6] http://www.ibm.com/developerworks/webservices/library/ws-soa-design1 [7] Bass, L.; Clements, P.; Kazman, R.: Software Architecture in Practice, Addison Wesley, 1998. [8] [BRJ99] Booch, G.; Rumbaugh, J.; Jacobson, I.: The Unified Modeling Language User Guide,1999 [9] Johnston, S.: UML 2.0 Profile for Software Services, IBM developerWorks 2005, [10] Zimmermann, O.; Milinski, M.; Craes, M.; Oellermann, F.: Second Generation Web Services-Oriented Architecture in Production in the Finance Industry, OOPSLA Conference Companion, 2004 [11] Zimmermann, O.; Doubrovski, V.; Grundler, J.; Hogg, K.: Service- Oriented Architecture and Business Process Choreography in an Order Management Scenario, OOPSLA Conference Companion, 2005 [12] U.S. Joint Forces Command. Global Information Grid Capstone Requirements Document. JROCM 134-01. Norfolk, VA: USJFCOM, Aug. 2001 https://jdl.jwfc.jfcom.mil/. [13] C4ISR Architecture Working Group. C4ISR Architecture Framework Vers. 2.0. Washington, D.C.: Department of Defense, 18 Dec. 1997 [14] www.fas.org/irp/program/core/fw.pdf. The next version is the DoD Architecture Framework Vers. 1.0. 15 Aug. 2003 www.aitcnet.org/dodfw