Implementing SOA: total architecture in practice
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ [u.a.]
Addison-Wesley
2008
|
Ausgabe: | 1. print. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXX, 699 S. Ill., graph. Darst. |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023119273 | ||
003 | DE-604 | ||
005 | 20100202 | ||
007 | t | ||
008 | 080208s2008 ad|| |||| 00||| eng d | ||
020 | |z 9780321504722 |9 978-0-321-50472-2 | ||
020 | |z 0321504720 |9 0-321-50472-0 | ||
035 | |a (OCoLC)172980368 | ||
035 | |a (DE-599)BVBBV023119273 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-20 |a DE-N2 |a DE-859 |a DE-522 | ||
050 | 0 | |a QA76.9.A73 | |
082 | 0 | |a 004.2/2 |2 22 | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
084 | |a SR 860 |0 (DE-625)143367: |2 rvk | ||
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
084 | |a ST 515 |0 (DE-625)143677: |2 rvk | ||
245 | 1 | 0 | |a Implementing SOA |b total architecture in practice |c Paul C. Brown |
250 | |a 1. print. | ||
264 | 1 | |a Upper Saddle River, NJ [u.a.] |b Addison-Wesley |c 2008 | |
300 | |a XXX, 699 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Management | |
650 | 4 | |a Computer architecture | |
650 | 4 | |a Computer network architectures | |
650 | 4 | |a Service-oriented architecture (Computer science) | |
650 | 4 | |a Web services | |
650 | 0 | 7 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |D s |
689 | 0 | 1 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Brown, Paul C. |e Sonstige |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016321775&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016321775 |
Datensatz im Suchindex
_version_ | 1804137388530728960 |
---|---|
adam_text | Contents
Preface......................................................................................................xxvii
PART I. Fundamentals ........................................................................... 1
Chapter 1: SOA and the Enterprise ..................................................... 3
The Challenge ............................................................................. 4
The Concept of Total Architecture ........................................... 5
Architecture Is Structure for a Purpose ................................... 6
Constant Changes ....................................................................... 7
Total Architecture Synthesis ..................................................... 8
Making Total Architecture Work in Your Enterprise ............ 9
Key Overview Questions ........................................................ 10
Chapter 2: Architecture Fundamentals ............................................. 11
Structural Organization ........................................................... 11
Components .......................................................................... 12
Subcomponents .................................................................... 13
Functional Organization .......................................................... 15
Shared Resources ................................................................. 16
Coping with Evolving Requirements ................................ 17
The Temptation of Expediency .......................................... 18
Collaborative Behavior ............................................................ 20
Activities ................................................................................ 20
Objects ................................................................................... 21
Communications .................................................................. 23
Business Processes ............................................................... 24
Total Architecture ..................................................................... 26
vu
vili Contents
Nonfunctional Requirements ................................................. 27
Refinement ................................................................................ 28
The Role of the Architect ........................................................ 29
Enterprise Architecture ........................................................... 30
Architecture Styles .............................................................. 30
Patterns ................................................................................. 33
Summary ................................................................................... 34
Key Architecture Fundamentals Questions ......................... 35
Suggested Reading .................................................................. 36
Chapter 3: Service Fundamentals ..................................................... 37
What Is a Service? .................................................................... 37
Operations ............................................................................ 38
Referenced Objects .............................................................. 39
Owned Objects ......................................... ........................... 40
Owning Relationships ........................................................ 42
Managing Cached Information ......................................... 44
Service Interfaces ................................................................... 47
Common Access Technology ............................................. 47
Common Data Representation Technology ..................... 48
Common Data Semantics ................................................... 50
Common Operation Semantics ......................................... 52
Choosing the Level of Interface Commonality ............... 52
The Rationale Behind Services ............................................... 54
Service Reuse ....................................................................... 54
Interface Stability ................................................................ 55
Service Evolution ................................................................ 56
Summary ................................................................................... 58
Key Service Fundamentals Questions .................................. 59
Suggested Reading .................................................................. 60
Chapter 4: Using Services .................................................................. 61
Service Interaction Patterns .................................................... 61
Synchronous Request-Reply .............................................. 61
Asynchronous Request-Reply ........................................... 62
Contents ix
Subscription .......................................................................... 64
Unsolicited Notification ...................................................... 64
Interaction Pattern Summary ............................................. 66
Service Access ........................................................................... 67
Direct Service Access ........................................................... 67
Variations in Direct Service Access ................................... 68
Direct Access Limitations ................................................... 69
Message-Based Service Access ........................................... 70
Access Control .......................................................................... 72
Policy Enforcement Points .................................................. 73
Access Control with Proxies ............................................... 74
Access Control with a Mediation Service ......................... 75
Service Request Routing .......................................................... 76
Load Distribution ................................................................. 76
Location-Based Routing ...................................................... 78
Content-Based Routing ....................................................... 78
Service Composition ................................................................ 80
Hard-Wired Composition ................................................... 81
Nested Composition ............................................................ 82
Cached Composites ............................................................. 83
Locating Services ...................................................................... 85
Enterprise Architecture for Services ...................................... 86
Summary ................................................................................... 87
Key Service Utilization Questions ......................................... 88
Suggested Reading ................................................................... 89
Chapter 5: The SOA Development Process ..................................... 91
What Is Different about SOA Development? ....................... 91
The Overall Development Process ......................................... 92
Architecture Tasks .................................................................... 94
Architecture in Context ........................................................... 96
Total Architecture Synthesis (TAS) ........................................ 97
Defining the Initial Scope ................................................. 101
Defining the Requirements ............................................... 102
Designing the Business Process Architecture ................ 103
Contents
Designing the Systems Architecture .............................. 104
Evaluating Architectures .................................................. 105
Beware of Look-Alike Processes! ........................................ 105
Manage Risk: Architect Iteratively ...................................... 106
Summary ................................................................................. 108
Key Development Process Questions ................................. 108
Suggested Reading ................................................................ 109
PART II. The Business Process Perspective ................................... Ill
Chapter 6: Processes ........................................................................... 113
Triggers, Inputs, and Results ................................................ 114
Related Processes .................................................................... 115
Process Maturity ..................................................................... 116
Continuous Processes ............................................................ 119
Structured Processes ............................................................. 120
Summary ................................................................................. 121
Key Process Questions .......................................................... 122
Suggested Reading ............................................................... 122
Chapter 7: Initial Project Scoping ................................................... 123
Assembling the Business Process Inventory ..................... 124
Conducting Interviews ......................................................... 125
Documenting the Inventory ................................................. 128
Goals and Stakeholders .................................................... 128
Primary Processes ............................................................. 130
Related Processes .............................................................. 133
Business Process Variants ................................................ 134
Process Metrics .................................................................. 136
Ranking Business Processes ................................................. 141
The Ranking Scheme ........................................................ 142
Combining the Scores ....................................................... 145
Organizing the Remaining Work ........................................ 147
Summary ................................................................................ 149
Key Scoping Questions ......................................................... 150
Contents xi
Chapter 8: The Artifice of Requirements ....................................... 151
Differentiation ......................................................................... 153
Differentiating Activities ................................................... 154
Differentiating Participants .............................................. 156
Design Is Differentiation ................................................... 157
Characterizing Processes ....................................................... 159
Collaborations Represent Processes ................................ 160
Collaboration Roles ............................................................ 161
Participants May Be Unaware of their Roles ................. 163
Patterns of Interaction ............................................................ 163
Use Case Descriptions ....................................................... 164
Use Case Limitations ......................................................... 164
UML Activity Diagrams .................................................... 165
The Interface Perspective .................................................. 169
Interaction Patterns Characterize Participants ............. 171
Requirements Reflect Design ................................................ 172
Requirements Specify Interaction Patterns .................... 172
Requirements Are Rarely Complete ................................ 174
Summary ................................................................................. 175
Key Requirements Questions ............................................... 177
Suggested Reading ................................................................. 178
Chapter 9: Business Process Architecture ...................................... 179
Results ...................................................................................... 180
Participants and Their Roles ................................................. 182
Differentiating Participant Types and Roles .................. 183
Roles Often Require Role-Specific Activities ................. 185
Roles and Business Process Evolution ............................ 185
Identifying and Understanding Roles ............................ 185
Activities and Scenarios ........................................................ 186
Scenarios and Variations ................................................... 187
Project Efficiency ................................................................ 189
xii Contents
Modeling Scenarios ............................................................... 191
Differentiating Participant Roles ..................................... 192
Assigning Activity Responsibilities ................................ 193
Modeling Interactions ........................................................... 198
Producer-Consumer Interactions .................................... 198
Simultaneous Interactions ............................................... 199
Notational Shortcuts ......................................................... 200
Scenario Variations ............................................................ 201
Exception Handling .......................................................... 203
How Much Detail Is Enough? ............................................. 204
Guidelines for Using Activity Diagrams ............................ 206
Summary ................................................................................. 207
Key Business Process Architecture Questions ................... 208
Suggested Reading ................................................................ 209
Chapter 10: Milestones ...................................................................... 211
Basic Process Milestones ........................................................ 211
Variations in Milestone Sequences ...................................... 214
Grouped Milestones .............................................................. 215
Recognizing Milestones Requires Design .......................... 216
Using Milestones to Reduce Inter-Process Coupling ....... 217
Summary ................................................................................. 218
Key Milestone Questions ...................................................... 219
Chapter 11: Process Constraints ...................................................... 221
Business Process Constraints Drive System Constraints . 222
Performance Constraints ...................................................... 224
Rates and Response Times ............................................... 224
Key Performance Indicators ............................................ 226
Performance Service-Level Agreements ....................... 228
High Availability and Fault Tolerance ................................ 231
Definition of Terms ........................................................... 231
It s All Relative .................................................................. 232
Investment versus Risk .................................................... 233
Contents xiii
Business Process Design Impacts Systems Investment 234
Focus on Risk ..................................................................... 235
Risk-Related Service-Level Agreements ......................... 237
Security ................................................................................... 238
Reporting, Monitoring, and Management ......................... 240
Reporting ............................................................................. 240
Monitoring .......................................................................... 241
Management ....................................................................... 241
Exception Handling ............................................................... 242
Test and Acceptance ............................................................... 243
Testing Can Impact System Design ................................. 244
Testing Can Require Additional Components ............... 244
Testing Requires an Environment .................................... 245
Compliance Constraints ........................................................ 245
Summary ................................................................................. 246
Key Process Constraint Questions ....................................... 247
Suggested Reading ................................................................. 248
Chapter 12: Related Processes .......................................................... 249
Identifying Services ................................................................ 252
Managing Shared State ..................................................... 252
Refining the Service Definition ........................................ 254
Modeling Existing Processes ............................................ 257
Triggering Events ................................................................... 258
Independent Processes ...................................................... 260
Dependent Processes ......................................................... 260
Towards Event-Driven Processes .................................... 263
Summary ................................................................................. 264
Key Related Process Questions ............................................ 265
Chapter 13: Modeling the Domain ................................................. 267
UML Class Notation .............................................................. 269
ATM Example Domain Model ............................................. 274
Reverse Engineering the Domain Model ............................ 276
xiv Contents
Domain Modeling Summary ............................................... 277
Key Domain Modeling Questions ....................................... 279
Suggested Reading ................................................................ 279
Chapter 14: Enterprise Architecture: Process and Domain
Modeling ................................................................................ 281
Process and Domain Modeling Responsibilities ............... 282
Establishing Standards and Best Practices ......................... 283
Managing Process and Domain Knowledge Transfer ...... 285
Reviewing Project Models .................................................... 286
Maintaining the Business Process and Domain Model
Repository ...................................................................... 287
Defining Business Process Patterns .................................... 288
Defining Common Data Model Representations .............. 288
Summary ................................................................................. 289
Key Enterprise Process and Domain Modeling
Questions ....................................................................... 290
PART III. The Systems Perspective ................................................ 291
Chapter 15: Systems Architecture Overview ................................ 293
The Challenge of Architecting Distributed Systems ........ 294
Learning from the CORBA Experience .............................. 294
Efficiently Exploring Architectures .................................... 300
Sequencing Architecture Issues ...................................... 301
Periodic Architecture Evaluation .................................... 302
Summary ................................................................................. 303
Key Systems Architecture Overview Questions ............... 304
Chapter 16: Top-Level Systems Architecture ............................... 305
First-Cut Structure ................................................................. 305
Initial Evaluation ................................................................... 307
Communications and Modularization ............................... 309
Communications Latency ............................................... 309
Communications Bandwidth .......................................... 310
Contents XV
Data Marshalling ................................................................ 311
Geographic Distribution ................................................... 311
Consider Other Modularization Approaches ................ 311
Service Identification and Performance .............................. 312
Modeling System Interactions .............................................. 312
Modeling Deployment ........................................................... 318
Addressing Performance ....................................................... 322
Peak Loads .......................................................................... 322
Response Times .................................................................. 323
Response Time Test Specifications .................................. 325
Early Architecture Evaluation .............................................. 325
Key Top-Level Systems Architecture Questions ................ 327
Suggested Reading ................................................................. 328
PART IV. Communications ............................................................... 329
Chapter 17: Transport ......................................................................... 331
Transport Technology ............................................................ 332
Person-to-Person Interactions .......................................... 333
Human-to-System Transport ............................................ 334
System-to-System Transport ............................................. 334
Selecting Transports ............................................................... 336
Messaging Server Topology .................................................. 340
Coping with Capacity Limitations .................................. 341
Coping with Geographic Distribution ............................ 342
Capacity .................................................................................. 345
Point-to-Point Interaction Patterns ...................................... 347
Point-to-Point Intermediaries ............................................... 348
Transport-Supplied Services ................................................. 350
Summary ................................................................................. 351
Key Transport Questions ....................................................... 351
Suggested Reading ................................................................. 352
xvi Contents
Chapter 18: Adapters ......................................................................... 353
API-Based Adapters .............................................................. 354
Database-Based Adapters .................................................... 355
Combining API and Database Approaches ....................... 356
File-Based Adapters .............................................................. 357
Protocol-Based Adapters ...................................................... 357
Documenting Adapter Usage .............................................. 358
Summary ................................................................................. 359
Key Adapter Questions ........................................................ 360
Chapter 19: Enterprise Architecture: Communications .............. 361
Defining a Communications Strategy ................................ 361
Interaction Standards ........................................................... 362
Standardizing Adapters ........................................................ 363
Summary ................................................................................. 364
Key Enterprise Architecture Communications
Questions ....................................................................... 364
PART V. Data and Operations ......................................................... 367
Chapter 20: Data Challenges ........................................................... 369
Chapter 21: Messages and Operations ........................................... 371
Message Semantics and Operation Names ........................ 371
Message Semantics ............................................................ 371
Operation Naming ............................................................ 373
Transport Destinations and Operation Bundling ............. 374
Bundling Advantages ....................................................... 374
Bundling Disadvantages .................................................. 375
Compromises ..................................................................... 375
Mediated Transports ......................................................... 376
Content Representation ........................................................ 377
Content Transformation ....................................................... 378
Reference Data in Content Transformation ....................... 380
Summary ................................................................................. 381
Key Messages and Operations Questions .......................... 381
Contents xvii
Chapter 22: Data Consistency: Maintaining One Version
of the Truth ............................................................................. 383
Approaches to Maintaining Data Consistency ................ 384
Cached Data with a Single System of Record .................... 385
Coordinated Updates via Distributed Transactions .......... 390
Edit Anywhere, Reconcile Later .......................................... 390
Dealing with Data Inconsistencies ....................................... 391
Data Management Business Processes ................................ 393
Summary ................................................................................. 394
Key Data Consistency Questions ......................................... 394
Suggested Reading ................................................................. 395
Chapter 23: Common Data Models (CDM) ................................... 397
What Is a Common Data Model? ......................................... 397
CDM Relationship to the Domain Model ........................... 402
The Need for Multiple CDM Representations ................... 405
Planning for CDM Changes .................................................. 407
Schema Versioning ............................................................. 408
Versioning with Additive Changes ................................. 409
Schema Migration Governance ........................................ 410
When to Use Common Data Models ................................... 411
Criteria for Choosing Direct Transformation ................. 413
Criteria for Choosing a Common Data Model .............. 414
Summary ................................................................................. 415
Key Common Data Model Questions ................................. 416
Chapter 24: Identifiers (Unique Names) ........................................ 417
Identity (Unique Name) Authorities ................................... 418
Hierarchical Identifiers .......................................................... 419
Hierarchical Identifiers within the Enterprise ............... 420
UUIDs and GUIDs ............................................................ 421
Coping with Identity Errors .................................................. 423
Consequences of Identity Errors ...................................... 424
Sources of Identity Errors ................................................. 424
Associating an Identifier with the Wrong Object .......... 425
xviii Contexts
Associating an Identifier with More than One
Real-World Object ......................................................... 426
Multiple Identifiers for the Same Object ........................ 429
Mapping Identifiers .............................................................. 429
Correlating Identifiers ...................................................... 431
Summary ................................................................................. 433
Key Identifier Questions ....................................................... 434
Chapter 25: Results Validation ........................................................ 435
Checking Enumerated Values .............................................. 436
Where and When to Validate .............................................. 437
Summary ................................................................................. 438
Key Data Validation Questions ........................................... 439
Chapter 26: Enterprise Architecture: Data .................................... 441
Naming Schemes ................................................................... 441
Architecting Content Transformation ................................. 443
Systems of Record .................................................................. 445
Common Data Models .......................................................... 446
Identifiers ................................................................................ 447
Data Quality Management ................................................... 448
Summary ................................................................................. 449
Key Enterprise Architecture Data Questions .................... 450
PART VI. Coordination .................................................................... 451
Chapter 27: Coordination and Breakdown Detection ................ 453
Activity Execution Management Patterns (AEMPs)
Involving Interactions .................................................. 454
Coordination Pattern Styles ................................................. 456
Fire-and-Eorget Coordination Patterns .............................. 457
Event-Driven Two-Party Fire-and-Forget ...................... 457
Event-Driven Multi-Party Fire-and-Forget ................... 457
Breakdown Detection in Fire-and-Forget ..................... 457
Non-Event-Driven Fire-and-Forget ................................ 459
Contents xix
Request-Reply Patterns ......................................................... 460
Event-Driven Two-Party Request-Reply ........................ 460
Reply-Time Service-Level Agreements ........................... 461
Event-Driven Multi-Party Request-Reply ...................... 462
Event-Driven Asynchronous Request-Reply ................. 463
Complexities in Asynchronous Request-Reply ............. 463
Synchronous Promise with Asynchronous Result ....... 464
Delegation ............................................................................... 465
Delegation with Confirmation ............................................. 467
Summary ................................................................................. 468
Key Coordination Questions ................................................ 469
Chapter 28: Transactions: Coordinating Two or More
Activities ................................................................................. 471
Two-Phase Commit Distributed Transactions .................... 472
Limitations of Two-Phase Commit Protocols ..................... 475
Compensating Transactions .................................................. 476
Working around the Limitations of Compensating
Transactions .................................................................... 476
Summary ................................................................................. 478
Key Transaction Questions ................................................... 479
Suggested Reading ................................................................. 479
Chapter 29: Process Monitors and Managers ............................... 481
Process Monitoring ............................................................... 483
Minimizing the Impact of Monitoring Breakdowns ......... 484
The Process Manager as a Monitor ...................................... 485
Process Management Limitations ....................................... 486
Summary ................................................................................. 488
Key Process Monitoring and Management Questions ..... 488
Chapter 30: Detecting and Responding to Breakdowns ............ 489
Selecting Coordination Patterns to Improve Breakdown
Detection ......................................................................... 489
Responding to Breakdowns ................................................. 493
Recording Breakdowns ..................................................... 493
XX Contents
Annunciating Breakdowns .............................................. 495
Responding to Breakdown Annunciations ................... 496
Recovering from Breakdowns ......................................... 500
Summary ................................................................................. 504
Key Breakdown Detection and Recovery Questions ....... 505
Chapter 31: Enterprise Architecture: Coordination .................... 507
Preferred Coordination Patterns ......................................... 507
Breakdown Recording .......................................................... 509
Breakdown Annunciation .................................................... 510
Recovery Processes ................................................................. 511
Summary .................................................................................. 511
Key Enterprise Coordination Questions ............................ 512
PART VII. High Availability, Fault Tolerance, and
Load Distribution .............................................................................. 513
Chapter 32: High Availability and Fault Tolerance
Fundamentals ........................................................................ 515
Fault Tolerance Strategies ..................................................... 516
Failure Detection Strategies ................................................. 517
Direct Component Monitoring ........................................ 517
Heartbeat Monitoring ....................................................... 518
Liveness Checks ................................................................ 519
Failover Management ........................................................... 519
Redirecting Clients ................................................................ 520
Summary ................................................................................. 522
Key High-Availability and Fault Tolerance Questions .... 523
Chapter 33: Stateless and Stateful Failover .................................. 525
Stateless and Stateful Components ..................................... 525
Stateless Failover ................................................................... 525
Saving Work in Progress through Coordination ............... 526
Stateful Failover ..................................................................... 528
Storage Replication ................................................................ 530
Synchronous Replication within a Component ............ 530
Contents xxi
Synchronous Replication between Components ........... 532
Asynchronous Replication and Data Loss ..................... 535
Persistent-State Component Failover ............................. 538
Summary ................................................................................. 540
Key Failover Questions ......................................................... 541
Suggested Reading ................................................................. 541
Chapter 34: Multiple Component Failover .................................... 543
Intra-Site versus Inter-Site Failover ..................................... 543
Clustering: An Intra-Site Failover Technique ..................... 545
Coordinating Peer Application Failover with
Asynchronous Replication ........................................... 546
Making a Business Process Fault-Tolerant .......................... 548
Summary ................................................................................. 550
Key Multi-Component Failover Questions ........................ 551
Chapter 35: Workload Distribution ................................................ 553
Work Assignment Strategies ................................................. 553
Distribution Management and Work Completion ............ 554
The Sequencing Problem ....................................................... 556
Centralized Sequence Management ................................ 556
Distributed Sequence Management ................................ 557
Access to Shared Persistent State ......................................... 557
Geographic Workload Distribution ..................................... 558
Summary ................................................................................. 558
Key Workload Distribution Questions ................................ 559
Chapter 36: Enterprise Architecture: Fault Tolerance,
High Availability, and Load Distribution ........................ 561
Business Process Categorization .......................................... 563
Information Storage ............................................................... 565
Individual Component and Service Failover Patterns ...... 565
Composite Patterns for FT and HA Services ...................... 566
Composite Patterns for FT and HA Business Processes ... 568
Summary ................................................................................. 568
xxii Contents
Key Enterprise Fault Tolerance, High-Availability, and
Load Distribution Questions ....................................... 569
Suggested Reading ................................................................ 569
PART VIII. Completing the Architecture ...................................... 571
Chapter 37: Process Security ............................................................ 573
Security Information Classification .................................... 574
Identity and Authentication ................................................. 574
The Authentication Process ............................................. 574
Reference Data for Authentication ................................. 576
Authorization ......................................................................... 576
The Granularity Problem ................................................. 577
Groups and Roles .............................................................. 577
Group and Role Limitations ............................................ 578
Encryption .............................................................................. 579
Digital Signatures .................................................................. 580
Other Security-Related Requirements ................................ 580
Reference Data Servers and Performance .......................... 581
Trust Zones ............................................................................. 582
Channel Enforcement ............................................................ 583
Zone Enforcement and Policy Agents ................................ 585
Multi-Zone Security .............................................................. 586
Summary ................................................................................. 587
Key Security Questions ......................................................... 588
Suggested Reading ................................................................ 589
Chapter 38: Process Monitoring ...................................................... 591
Performance Monitoring ...................................................... 592
Monitoring at One Point .................................................. 592
Uncorrelated Monitoring at Two Points ........................ 593
Correlated Monitoring at Two Points ............................. 593
Monitoring Process Status .................................................... 594
Supervisory Processes ........................................................... 595
The Impact of Monitoring on Performance ....................... 596
Contents xxiii
Summary ................................................................................. 596
Key Process Monitoring Questions ..................................... 597
Chapter 39: Architecture Evaluation ............................................... 599
Usability ................................................................................... 600
Performance ............................................................................ 600
Component Resource Demand Analysis ........................ 601
Estimating CPU Requirements ........................................ 604
Messaging and Disk Performance ................................... 605
Deployment Load Analysis .............................................. 609
Evolving the Load Model ................................................. 610
Cost and Schedule Feasibility ............................................... 612
Observability ........................................................................... 613
Ability to Evolve .................................................................... 613
Ability to Handle Stress Situations ...................................... 614
Summary ................................................................................. 615
Key Architecture Evaluation Questions .............................. 616
Suggested Reading ................................................................. 617
Chapter 40: Testing ............................................................................. 619
Unit Testing, Test Harnesses, and Regression Testing ...... 620
Integration Testing and Order of Assembly ....................... 621
Environments for Functional and System Testing ............. 622
Performance Testing ............................................................... 623
Making Capacity Measurements ..................................... 624
System Capacity Testing ................................................... 626
Failure Mode Testing ............................................................. 627
Summary ................................................................................. 628
Key Testing Questions ........................................................... 628
PART IX. Advanced Topics ............................................................... 631
Chapter 41: Representing a Complex Process .............................. 633
Eliding Communications Detail ........................................... 634
Eliding Participant Activity Details ..................................... 634
xxiv Contents
Eliding Supporting Participants .......................................... 636
Abstracting Subprocesses .....................,............................... 638
Summary ................................................................................. 639
Key Complex Process Representation Questions ............. 639
Chapter 42: Process Management and Workflow ........................ 641
Process Management ............................................................ 642
Process Management Goals ............................................. 642
The Management Process Is Not the Work Process! ... 644
Maintaining Separation between Processes and Work 645
Styles of Work Assignment .................................................. 647
Work Queues and Work Assignments ........................... 647
Initiating Workflow ............................................................... 649
Making the Management Process Fault Tolerant .............. 649
Using Fault-Tolerant Workflow Engines ....................... 651
Checkpointing the Management Process State ............. 653
Request-Reply Invocation of the Management
Process ............................................................................ 655
Hybrid Fault Tolerance Techniques ................................ 655
Human Interfaces .................................................................. 656
Work Assignment Responsibilities ................................. 657
Data Responsibilities ........................................................ 658
User Interface Failure Recovery ...................................... 659
Related Processes ................................................................... 660
Prioritized Work .................................................................... 663
Dynamic Work Assignments ............................................... 665
Dynamic Result and Process Definitions ........................... 666
Representing a Design ...................................................... 667
Specifying an Implementation Process .......................... 667
Accommodating Subsequent Changes .......................... 668
Summary ................................................................................ 668
Key Process Management and Workflow Questions ....... 669
Suggested Reading ................................................................ 670
Contents xxv
Chapter 43: The Enterprise Architecture Group ........................... 671
Half a Group Is Better than None—But Not Good
Enough ............................................................................ 672
Best Practice Development ................................................... 672
Knowledge Transfer ............................................................... 673
Documentation ................................................................... 674
Training ................................................................................ 674
Mentoring ............................................................................ 675
Governance ............................................................................. 675
Designing with Evolving Requirements ............................. 675
Hierarchical Architectures ................................................ 677
Geographic Deployment .................................................. 679
Organizational Alignment ................................................ 680
Summary ................................................................................. 681
Key Enterprise Architecture Group Questions .................. 682
Afterword ............................................................................................. 683
Focus Your Work .................................................................... 683
Seek the Expertise of Others ................................................. 684
Be Pragmatic, But Consider the Long View ....................... 685
Index ..................................................................................................... 687
|
adam_txt |
Contents
Preface.xxvii
PART I. Fundamentals . 1
Chapter 1: SOA and the Enterprise . 3
The Challenge . 4
The Concept of Total Architecture . 5
Architecture Is Structure for a Purpose . 6
Constant Changes . 7
Total Architecture Synthesis . 8
Making Total Architecture Work in Your Enterprise . 9
Key Overview Questions . 10
Chapter 2: Architecture Fundamentals . 11
Structural Organization . 11
Components . 12
Subcomponents . 13
Functional Organization . 15
Shared Resources . 16
Coping with Evolving Requirements . 17
The Temptation of Expediency . 18
Collaborative Behavior . 20
Activities . 20
Objects . 21
Communications . 23
Business Processes . 24
Total Architecture . 26
vu
vili Contents
Nonfunctional Requirements . 27
Refinement . 28
The Role of the Architect . 29
Enterprise Architecture . 30
Architecture Styles . 30
Patterns . 33
Summary . 34
Key Architecture Fundamentals Questions . 35
Suggested Reading . 36
Chapter 3: Service Fundamentals . 37
What Is a Service? . 37
Operations . 38
Referenced Objects . 39
Owned Objects .'. 40
Owning Relationships . 42
Managing Cached Information . 44
Service Interfaces . 47
Common Access Technology . 47
Common Data Representation Technology . 48
Common Data Semantics . 50
Common Operation Semantics . 52
Choosing the Level of Interface Commonality . 52
The Rationale Behind Services . 54
Service Reuse . 54
Interface Stability . 55
Service Evolution . 56
Summary . 58
Key Service Fundamentals Questions . 59
Suggested Reading . 60
Chapter 4: Using Services . 61
Service Interaction Patterns . 61
Synchronous Request-Reply . 61
Asynchronous Request-Reply . 62
Contents ix
Subscription . 64
Unsolicited Notification . 64
Interaction Pattern Summary . 66
Service Access . 67
Direct Service Access . 67
Variations in Direct Service Access . 68
Direct Access Limitations . 69
Message-Based Service Access . 70
Access Control . 72
Policy Enforcement Points . 73
Access Control with Proxies . 74
Access Control with a Mediation Service . 75
Service Request Routing . 76
Load Distribution . 76
Location-Based Routing . 78
Content-Based Routing . 78
Service Composition . 80
Hard-Wired Composition . 81
Nested Composition . 82
Cached Composites . 83
Locating Services . 85
Enterprise Architecture for Services . 86
Summary . 87
Key Service Utilization Questions . 88
Suggested Reading . 89
Chapter 5: The SOA Development Process . 91
What Is Different about SOA Development? . 91
The Overall Development Process . 92
Architecture Tasks . 94
Architecture in Context . 96
Total Architecture Synthesis (TAS) . 97
Defining the Initial Scope . 101
Defining the Requirements . 102
Designing the Business Process Architecture . 103
Contents
Designing the Systems Architecture . 104
Evaluating Architectures . 105
Beware of Look-Alike Processes! . 105
Manage Risk: Architect Iteratively . 106
Summary . 108
Key Development Process Questions . 108
Suggested Reading . 109
PART II. The Business Process Perspective . Ill
Chapter 6: Processes . 113
Triggers, Inputs, and Results . 114
Related Processes . 115
Process Maturity . 116
Continuous Processes . 119
Structured Processes . 120
Summary . 121
Key Process Questions . 122
Suggested Reading . 122
Chapter 7: Initial Project Scoping . 123
Assembling the Business Process Inventory . 124
Conducting Interviews . 125
Documenting the Inventory . 128
Goals and Stakeholders . 128
Primary Processes . 130
Related Processes . 133
Business Process Variants . 134
Process Metrics . 136
Ranking Business Processes . 141
The Ranking Scheme . 142
Combining the Scores . 145
Organizing the Remaining Work . 147
Summary . 149
Key Scoping Questions . 150
Contents xi
Chapter 8: The Artifice of Requirements . 151
Differentiation . 153
Differentiating Activities . 154
Differentiating Participants . 156
Design Is Differentiation . 157
Characterizing Processes . 159
Collaborations Represent Processes . 160
Collaboration Roles . 161
Participants May Be Unaware of their Roles . 163
Patterns of Interaction . 163
Use Case Descriptions . 164
Use Case Limitations . 164
UML Activity Diagrams . 165
The Interface Perspective . 169
Interaction Patterns Characterize Participants . 171
Requirements Reflect Design . 172
Requirements Specify Interaction Patterns . 172
Requirements Are Rarely Complete . 174
Summary . 175
Key Requirements Questions . 177
Suggested Reading . 178
Chapter 9: Business Process Architecture . 179
Results . 180
Participants and Their Roles . 182
Differentiating Participant Types and Roles . 183
Roles Often Require Role-Specific Activities . 185
Roles and Business Process Evolution . 185
Identifying and Understanding Roles . 185
Activities and Scenarios . 186
Scenarios and Variations . 187
Project Efficiency . 189
xii Contents
Modeling Scenarios . 191
Differentiating Participant Roles . 192
Assigning Activity Responsibilities . 193
Modeling Interactions . 198
Producer-Consumer Interactions . 198
Simultaneous Interactions . 199
Notational Shortcuts . 200
Scenario Variations . 201
Exception Handling . 203
How Much Detail Is Enough? . 204
Guidelines for Using Activity Diagrams . 206
Summary . 207
Key Business Process Architecture Questions . 208
Suggested Reading . 209
Chapter 10: Milestones . 211
Basic Process Milestones . 211
Variations in Milestone Sequences . 214
Grouped Milestones . 215
Recognizing Milestones Requires Design . 216
Using Milestones to Reduce Inter-Process Coupling . 217
Summary . 218
Key Milestone Questions . 219
Chapter 11: Process Constraints . 221
Business Process Constraints Drive System Constraints . 222
Performance Constraints . 224
Rates and Response Times . 224
Key Performance Indicators . 226
Performance Service-Level Agreements . 228
High Availability and Fault Tolerance . 231
Definition of Terms . 231
It's All Relative . 232
Investment versus Risk . 233
Contents xiii
Business Process Design Impacts Systems Investment 234
Focus on Risk . 235
Risk-Related Service-Level Agreements . 237
Security . 238
Reporting, Monitoring, and Management . 240
Reporting . 240
Monitoring . 241
Management . 241
Exception Handling . 242
Test and Acceptance . 243
Testing Can Impact System Design . 244
Testing Can Require Additional Components . 244
Testing Requires an Environment . 245
Compliance Constraints . 245
Summary . 246
Key Process Constraint Questions . 247
Suggested Reading . 248
Chapter 12: Related Processes . 249
Identifying Services . 252
Managing Shared State . 252
Refining the Service Definition . 254
Modeling Existing Processes . 257
Triggering Events . 258
Independent Processes . 260
Dependent Processes . 260
Towards Event-Driven Processes . 263
Summary . 264
Key Related Process Questions . 265
Chapter 13: Modeling the Domain . 267
UML Class Notation . 269
ATM Example Domain Model . 274
Reverse Engineering the Domain Model . 276
xiv Contents
Domain Modeling Summary . 277
Key Domain Modeling Questions . 279
Suggested Reading . 279
Chapter 14: Enterprise Architecture: Process and Domain
Modeling . 281
Process and Domain Modeling Responsibilities . 282
Establishing Standards and Best Practices . 283
Managing Process and Domain Knowledge Transfer . 285
Reviewing Project Models . 286
Maintaining the Business Process and Domain Model
Repository . 287
Defining Business Process Patterns . 288
Defining Common Data Model Representations . 288
Summary . 289
Key Enterprise Process and Domain Modeling
Questions . 290
PART III. The Systems Perspective . 291
Chapter 15: Systems Architecture Overview . 293
The Challenge of Architecting Distributed Systems . 294
Learning from the CORBA Experience . 294
Efficiently Exploring Architectures . 300
Sequencing Architecture Issues . 301
Periodic Architecture Evaluation . 302
Summary . 303
Key Systems Architecture Overview Questions . 304
Chapter 16: Top-Level Systems Architecture . 305
First-Cut Structure . 305
Initial Evaluation . 307
Communications and Modularization . 309
Communications Latency . 309
Communications Bandwidth . 310
Contents XV
Data Marshalling . 311
Geographic Distribution . 311
Consider Other Modularization Approaches . 311
Service Identification and Performance . 312
Modeling System Interactions . 312
Modeling Deployment . 318
Addressing Performance . 322
Peak Loads . 322
Response Times . 323
Response Time Test Specifications . 325
Early Architecture Evaluation . 325
Key Top-Level Systems Architecture Questions . 327
Suggested Reading . 328
PART IV. Communications . 329
Chapter 17: Transport . 331
Transport Technology . 332
Person-to-Person Interactions . 333
Human-to-System Transport . 334
System-to-System Transport . 334
Selecting Transports . 336
Messaging Server Topology . 340
Coping with Capacity Limitations . 341
Coping with Geographic Distribution . 342
Capacity . 345
Point-to-Point Interaction Patterns . 347
Point-to-Point Intermediaries . 348
Transport-Supplied Services . 350
Summary . 351
Key Transport Questions . 351
Suggested Reading . 352
xvi Contents
Chapter 18: Adapters . 353
API-Based Adapters . 354
Database-Based Adapters . 355
Combining API and Database Approaches . 356
File-Based Adapters . 357
Protocol-Based Adapters . 357
Documenting Adapter Usage . 358
Summary . 359
Key Adapter Questions . 360
Chapter 19: Enterprise Architecture: Communications . 361
Defining a Communications Strategy . 361
Interaction Standards . 362
Standardizing Adapters . 363
Summary . 364
Key Enterprise Architecture Communications
Questions . 364
PART V. Data and Operations . 367
Chapter 20: Data Challenges . 369
Chapter 21: Messages and Operations . 371
Message Semantics and Operation Names . 371
Message Semantics . 371
Operation Naming . 373
Transport Destinations and Operation Bundling . 374
Bundling Advantages . 374
Bundling Disadvantages . 375
Compromises . 375
Mediated Transports . 376
Content Representation . 377
Content Transformation . 378
Reference Data in Content Transformation . 380
Summary . 381
Key Messages and Operations Questions . 381
Contents xvii
Chapter 22: Data Consistency: Maintaining One Version
of the Truth . 383
Approaches to Maintaining Data Consistency . 384
Cached Data with a Single System of Record . 385
Coordinated Updates via Distributed Transactions . 390
Edit Anywhere, Reconcile Later . 390
Dealing with Data Inconsistencies . 391
Data Management Business Processes . 393
Summary . 394
Key Data Consistency Questions . 394
Suggested Reading . 395
Chapter 23: Common Data Models (CDM) . 397
What Is a Common Data Model? . 397
CDM Relationship to the Domain Model . 402
The Need for Multiple CDM Representations . 405
Planning for CDM Changes . 407
Schema Versioning . 408
Versioning with Additive Changes . 409
Schema Migration Governance . 410
When to Use Common Data Models . 411
Criteria for Choosing Direct Transformation . 413
Criteria for Choosing a Common Data Model . 414
Summary . 415
Key Common Data Model Questions . 416
Chapter 24: Identifiers (Unique Names) . 417
Identity (Unique Name) Authorities . 418
Hierarchical Identifiers . 419
Hierarchical Identifiers within the Enterprise . 420
UUIDs and GUIDs . 421
Coping with Identity Errors . 423
Consequences of Identity Errors . 424
Sources of Identity Errors . 424
Associating an Identifier with the Wrong Object . 425
xviii Contexts
Associating an Identifier with More than One
Real-World Object . 426
Multiple Identifiers for the Same Object . 429
Mapping Identifiers . 429
Correlating Identifiers . 431
Summary . 433
Key Identifier Questions . 434
Chapter 25: Results Validation . 435
Checking Enumerated Values . 436
Where and When to Validate . 437
Summary . 438
Key Data Validation Questions . 439
Chapter 26: Enterprise Architecture: Data . 441
Naming Schemes . 441
Architecting Content Transformation . 443
Systems of Record . 445
Common Data Models . 446
Identifiers . 447
Data Quality Management . 448
Summary . 449
Key Enterprise Architecture Data Questions . 450
PART VI. Coordination . 451
Chapter 27: Coordination and Breakdown Detection . 453
Activity Execution Management Patterns (AEMPs)
Involving Interactions . 454
Coordination Pattern Styles . 456
Fire-and-Eorget Coordination Patterns . 457
Event-Driven Two-Party Fire-and-Forget . 457
Event-Driven Multi-Party Fire-and-Forget . 457
Breakdown Detection in Fire-and-Forget . 457
Non-Event-Driven Fire-and-Forget . 459
Contents xix
Request-Reply Patterns . 460
Event-Driven Two-Party Request-Reply . 460
Reply-Time Service-Level Agreements . 461
Event-Driven Multi-Party Request-Reply . 462
Event-Driven Asynchronous Request-Reply . 463
Complexities in Asynchronous Request-Reply . 463
Synchronous Promise with Asynchronous Result . 464
Delegation . 465
Delegation with Confirmation . 467
Summary . 468
Key Coordination Questions . 469
Chapter 28: Transactions: Coordinating Two or More
Activities . 471
Two-Phase Commit Distributed Transactions . 472
Limitations of Two-Phase Commit Protocols . 475
Compensating Transactions . 476
Working around the Limitations of Compensating
Transactions . 476
Summary . 478
Key Transaction Questions . 479
Suggested Reading . 479
Chapter 29: Process Monitors and Managers . 481
Process Monitoring . 483
Minimizing the Impact of Monitoring Breakdowns . 484
The Process Manager as a Monitor . 485
Process Management Limitations . 486
Summary . 488
Key Process Monitoring and Management Questions . 488
Chapter 30: Detecting and Responding to Breakdowns . 489
Selecting Coordination Patterns to Improve Breakdown
Detection . 489
Responding to Breakdowns . 493
Recording Breakdowns . 493
XX Contents
Annunciating Breakdowns . 495
Responding to Breakdown Annunciations . 496
Recovering from Breakdowns . 500
Summary . 504
Key Breakdown Detection and Recovery Questions . 505
Chapter 31: Enterprise Architecture: Coordination . 507
Preferred Coordination Patterns . 507
Breakdown Recording . 509
Breakdown Annunciation . 510
Recovery Processes . 511
Summary . 511
Key Enterprise Coordination Questions . 512
PART VII. High Availability, Fault Tolerance, and
Load Distribution . 513
Chapter 32: High Availability and Fault Tolerance
Fundamentals . 515
Fault Tolerance Strategies . 516
Failure Detection Strategies . 517
Direct Component Monitoring . 517
Heartbeat Monitoring . 518
Liveness Checks . 519
Failover Management . 519
Redirecting Clients . 520
Summary . 522
Key High-Availability and Fault Tolerance Questions . 523
Chapter 33: Stateless and Stateful Failover . 525
Stateless and Stateful Components . 525
Stateless Failover . 525
Saving Work in Progress through Coordination . 526
Stateful Failover . 528
Storage Replication . 530
Synchronous Replication within a Component . 530
Contents xxi
Synchronous Replication between Components . 532
Asynchronous Replication and Data Loss . 535
Persistent-State Component Failover . 538
Summary . 540
Key Failover Questions . 541
Suggested Reading . 541
Chapter 34: Multiple Component Failover . 543
Intra-Site versus Inter-Site Failover . 543
Clustering: An Intra-Site Failover Technique . 545
Coordinating Peer Application Failover with
Asynchronous Replication . 546
Making a Business Process Fault-Tolerant . 548
Summary . 550
Key Multi-Component Failover Questions . 551
Chapter 35: Workload Distribution . 553
Work Assignment Strategies . 553
Distribution Management and Work Completion . 554
The Sequencing Problem . 556
Centralized Sequence Management . 556
Distributed Sequence Management . 557
Access to Shared Persistent State . 557
Geographic Workload Distribution . 558
Summary . 558
Key Workload Distribution Questions . 559
Chapter 36: Enterprise Architecture: Fault Tolerance,
High Availability, and Load Distribution . 561
Business Process Categorization . 563
Information Storage . 565
Individual Component and Service Failover Patterns . 565
Composite Patterns for FT and HA Services . 566
Composite Patterns for FT and HA Business Processes . 568
Summary . 568
xxii Contents
Key Enterprise Fault Tolerance, High-Availability, and
Load Distribution Questions . 569
Suggested Reading . 569
PART VIII. Completing the Architecture . 571
Chapter 37: Process Security . 573
Security Information Classification . 574
Identity and Authentication . 574
The Authentication Process . 574
Reference Data for Authentication . 576
Authorization . 576
The Granularity Problem . 577
Groups and Roles . 577
Group and Role Limitations . 578
Encryption . 579
Digital Signatures . 580
Other Security-Related Requirements . 580
Reference Data Servers and Performance . 581
Trust Zones . 582
Channel Enforcement . 583
Zone Enforcement and Policy Agents . 585
Multi-Zone Security . 586
Summary . 587
Key Security Questions . 588
Suggested Reading . 589
Chapter 38: Process Monitoring . 591
Performance Monitoring . 592
Monitoring at One Point . 592
Uncorrelated Monitoring at Two Points . 593
Correlated Monitoring at Two Points . 593
Monitoring Process Status . 594
Supervisory Processes . 595
The Impact of Monitoring on Performance . 596
Contents xxiii
Summary . 596
Key Process Monitoring Questions . 597
Chapter 39: Architecture Evaluation . 599
Usability . 600
Performance . 600
Component Resource Demand Analysis . 601
Estimating CPU Requirements . 604
Messaging and Disk Performance . 605
Deployment Load Analysis . 609
Evolving the Load Model . 610
Cost and Schedule Feasibility . 612
Observability . 613
Ability to Evolve . 613
Ability to Handle Stress Situations . 614
Summary . 615
Key Architecture Evaluation Questions . 616
Suggested Reading . 617
Chapter 40: Testing . 619
Unit Testing, Test Harnesses, and Regression Testing . 620
Integration Testing and Order of Assembly . 621
Environments for Functional and System Testing . 622
Performance Testing . 623
Making Capacity Measurements . 624
System Capacity Testing . 626
Failure Mode Testing . 627
Summary . 628
Key Testing Questions . 628
PART IX. Advanced Topics . 631
Chapter 41: Representing a Complex Process . 633
Eliding Communications Detail . 634
Eliding Participant Activity Details . 634
xxiv Contents
Eliding Supporting Participants . 636
Abstracting Subprocesses .,. 638
Summary . 639
Key Complex Process Representation Questions . 639
Chapter 42: Process Management and Workflow . 641
Process Management . 642
Process Management Goals . 642
The Management Process Is Not the Work Process! . 644
Maintaining Separation between Processes and Work 645
Styles of Work Assignment . 647
Work Queues and Work Assignments . 647
Initiating Workflow . 649
Making the Management Process Fault Tolerant . 649
Using Fault-Tolerant Workflow Engines . 651
Checkpointing the Management Process State . 653
Request-Reply Invocation of the Management
Process . 655
Hybrid Fault Tolerance Techniques . 655
Human Interfaces . 656
Work Assignment Responsibilities . 657
Data Responsibilities . 658
User Interface Failure Recovery . 659
Related Processes . 660
Prioritized Work . 663
Dynamic Work Assignments . 665
Dynamic Result and Process Definitions . 666
Representing a Design . 667
Specifying an Implementation Process . 667
Accommodating Subsequent Changes . 668
Summary . 668
Key Process Management and Workflow Questions . 669
Suggested Reading . 670
Contents xxv
Chapter 43: The Enterprise Architecture Group . 671
Half a Group Is Better than None—But Not Good
Enough . 672
Best Practice Development . 672
Knowledge Transfer . 673
Documentation . 674
Training . 674
Mentoring . 675
Governance . 675
Designing with Evolving Requirements . 675
Hierarchical Architectures . 677
Geographic Deployment . 679
Organizational Alignment . 680
Summary . 681
Key Enterprise Architecture Group Questions . 682
Afterword . 683
Focus Your Work . 683
Seek the Expertise of Others . 684
Be Pragmatic, But Consider the Long View . 685
Index . 687 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV023119273 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A73 |
callnumber-search | QA76.9.A73 |
callnumber-sort | QA 276.9 A73 |
callnumber-subject | QA - Mathematics |
classification_rvk | QP 345 SR 860 ST 230 ST 515 |
ctrlnum | (OCoLC)172980368 (DE-599)BVBBV023119273 |
dewey-full | 004.2/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.2/2 |
dewey-search | 004.2/2 |
dewey-sort | 14.2 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
edition | 1. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01881nam a2200493 c 4500</leader><controlfield tag="001">BV023119273</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100202 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080208s2008 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780321504722</subfield><subfield code="9">978-0-321-50472-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0321504720</subfield><subfield code="9">0-321-50472-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)172980368</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023119273</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-N2</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A73</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.2/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 860</subfield><subfield code="0">(DE-625)143367:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 515</subfield><subfield code="0">(DE-625)143677:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing SOA</subfield><subfield code="b">total architecture in practice</subfield><subfield code="c">Paul C. Brown</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXX, 699 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Service-oriented architecture (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web services</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brown, Paul C.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016321775&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016321775</subfield></datafield></record></collection> |
id | DE-604.BV023119273 |
illustrated | Illustrated |
index_date | 2024-07-02T19:50:58Z |
indexdate | 2024-07-09T21:11:28Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016321775 |
oclc_num | 172980368 |
open_access_boolean | |
owner | DE-20 DE-N2 DE-859 DE-522 |
owner_facet | DE-20 DE-N2 DE-859 DE-522 |
physical | XXX, 699 S. Ill., graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Implementing SOA total architecture in practice Paul C. Brown 1. print. Upper Saddle River, NJ [u.a.] Addison-Wesley 2008 XXX, 699 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Unternehmen Business enterprises Computer networks Management Computer architecture Computer network architectures Service-oriented architecture (Computer science) Web services Serviceorientierte Architektur (DE-588)4841015-9 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 s Unternehmen (DE-588)4061963-1 s DE-604 Brown, Paul C. Sonstige oth HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016321775&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Implementing SOA total architecture in practice Unternehmen Business enterprises Computer networks Management Computer architecture Computer network architectures Service-oriented architecture (Computer science) Web services Serviceorientierte Architektur (DE-588)4841015-9 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4841015-9 (DE-588)4061963-1 |
title | Implementing SOA total architecture in practice |
title_auth | Implementing SOA total architecture in practice |
title_exact_search | Implementing SOA total architecture in practice |
title_exact_search_txtP | Implementing SOA total architecture in practice |
title_full | Implementing SOA total architecture in practice Paul C. Brown |
title_fullStr | Implementing SOA total architecture in practice Paul C. Brown |
title_full_unstemmed | Implementing SOA total architecture in practice Paul C. Brown |
title_short | Implementing SOA |
title_sort | implementing soa total architecture in practice |
title_sub | total architecture in practice |
topic | Unternehmen Business enterprises Computer networks Management Computer architecture Computer network architectures Service-oriented architecture (Computer science) Web services Serviceorientierte Architektur (DE-588)4841015-9 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | Unternehmen Business enterprises Computer networks Management Computer architecture Computer network architectures Service-oriented architecture (Computer science) Web services Serviceorientierte Architektur |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016321775&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT brownpaulc implementingsoatotalarchitectureinpractice |