Design Patterns
Approach -1
Our scenario thinks about how the data and identical or dissimilar services are shared in the proposed system by mean of defined rules set by multiple clients for their system. .For example, if the proposed system needs only limited information from the existing database of the client for a transaction service defined , it can be retrieved through Web services and using XML orchestration defined in the system of a client. Data Synchronization Engine (DSE) enables the service to synchronize the data between the existing applications and proposed system of a client .We can ensure the clients that, the data is secured with them by means of defined orchestration mechanism and rules. Any client system can communicate with DSE for sharing the data for services and can getting a copy of the transaction made at service points. It enables a clients to ensure on data security. The database serves at service end always keep the necessary data for their transaction for a client. This enables an application to retrieve the required data from their environment at runtime. A web service running at both ends can be used to orchestrate the transaction.
The SOA based application framework handles logistics needed for a client system. A dedicated Application Request Processing Engine (ARPE) makes the rules by looking up the client specific orchestration, and decides which logistics (service) is to be tracked by means of a client call. We can place N-number loosely coupled of logistic components (services) framework based on varying domains for multiple clients. Therefore, it enables N-umber of clients to access their services by looking up the rules generated by rule engine on demand. These components eventually communicate to the Data Access Mechanism (DAM) for data needed for a service.
Any application running for any clients above this layer can make use of Application framework components by giving a request to the ARPE. This ensures safe keeping multiple clients system on their data and logistics (services ). This can be configured by clients using a secure connection mechanism and client specific xml orchestration.
The above two approaches differs in Data Access Mechanism. In a transition phase clients may not be confident enough to share the data. In this prospect, we can follow the first approach for transactions and update to the second one on common defined agreements. This is for ensuring data security at any point during IT enabling stages. The above given approaches are not a full implementation of the new model. Any review comments will be appreciated and added along with this.
Deployment Model
Approach -1
Approach -2
Design Description
The above diagram gives a sneak preview of high-level implementation model of the proposal. Here the Service environment is number of SOA based internal systems running under IT department. It can be in a client environment either the client provided services or an environment provided by an IT vendor.
The above diagram gives a sneak preview of high-level implementation model of the proposal. Here the Service environment is number of SOA based internal systems running under IT department. It can be in a client environment either the client provided services or an environment provided by an IT vendor.
Our scenario thinks about how the data and identical or dissimilar services are shared in the proposed system by mean of defined rules set by multiple clients for their system. .For example, if the proposed system needs only limited information from the existing database of the client for a transaction service defined , it can be retrieved through Web services and using XML orchestration defined in the system of a client. Data Synchronization Engine (DSE) enables the service to synchronize the data between the existing applications and proposed system of a client .We can ensure the clients that, the data is secured with them by means of defined orchestration mechanism and rules. Any client system can communicate with DSE for sharing the data for services and can getting a copy of the transaction made at service points. It enables a clients to ensure on data security. The database serves at service end always keep the necessary data for their transaction for a client. This enables an application to retrieve the required data from their environment at runtime. A web service running at both ends can be used to orchestrate the transaction.
The SOA based application framework handles logistics needed for a client system. A dedicated Application Request Processing Engine (ARPE) makes the rules by looking up the client specific orchestration, and decides which logistics (service) is to be tracked by means of a client call. We can place N-number loosely coupled of logistic components (services) framework based on varying domains for multiple clients. Therefore, it enables N-umber of clients to access their services by looking up the rules generated by rule engine on demand. These components eventually communicate to the Data Access Mechanism (DAM) for data needed for a service.
Any application running for any clients above this layer can make use of Application framework components by giving a request to the ARPE. This ensures safe keeping multiple clients system on their data and logistics (services ). This can be configured by clients using a secure connection mechanism and client specific xml orchestration.
The above two approaches differs in Data Access Mechanism. In a transition phase clients may not be confident enough to share the data. In this prospect, we can follow the first approach for transactions and update to the second one on common defined agreements. This is for ensuring data security at any point during IT enabling stages. The above given approaches are not a full implementation of the new model. Any review comments will be appreciated and added along with this.
Deployment Model
Description
Application
Access Layer is any client system that supports internally or externally
to a business process. It can be thick client application that accesses the
data for verification and validation purpose. Or it can be an internet based or
thin client environment that make use of data through services. This need to
have only limited configuration features
SOA Service
layer, A service layer that ensure a highly integrated and secure data
handling mechanism to the clients by following Service Oriented Architecture.
It can be run at a dedicated service provider’s environment. Since this
framework ensure the data security and service privacy using well defined XML
rules. Here a client can ensure the security of both data and service through a
secure data connection mechanism defined by them. We can ensure this through a
secure connection mechanism. A client can have control over this by a defined
rules signed by both client and service provider.
A temporary
database/memory representation of data can be provided at service layer based
on signed rules for better data security and dynamic data retrieval to the
clients using modern database features. A legacy system data can be fetched
here for faster transaction purposes and be can saved back to the client’s data
centers periodically.
Secure Data
layer, this can be a legacy system data centers or databases running on
multiple environment at client side. Secure data transaction with service layer
can be enforced by rule signed by both Service framework and client. Once the
client is willing to share the data we can dynamically get the data from the client
specific dedicated data centers for a transaction.
Review
comments on this model will be appreciated and reach me for guidance:
About
Me :Vinod Nair
Email
: avtvinod@hotmail.com