12.07.2015 Views

Migration of a Chosen Architectural Pattern to Service Oriented ...

Migration of a Chosen Architectural Pattern to Service Oriented ...

Migration of a Chosen Architectural Pattern to Service Oriented ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 5. Guidelines 110Problem The same business rules are applied in many different services.This may lead <strong>to</strong> redundancy and problem with maintenance <strong>of</strong> the changes.ContextA System uses many rules across services.Forces(a) Rules may change over time(b) New rules may be added(c) Outdated rules may be removed(d) One rule may be used by many servicesSolution Business rules are s<strong>to</strong>red and accessible through dedicated entitieslike business rules services.Result Context The application has unified access and s<strong>to</strong>rage <strong>of</strong> businessrules. The rules are easy <strong>to</strong> update and access.9. Name Inven<strong>to</strong>ry EndpointProblem An inven<strong>to</strong>ry may contain several services providing functionalitythat might be used outside the inven<strong>to</strong>ry. <strong>Service</strong>s accessing the inven<strong>to</strong>ryfrom outside should not know structure <strong>of</strong> the inven<strong>to</strong>ry and itsfunctionality. The access also needs <strong>to</strong> be secured.ContextAn application exposes some <strong>of</strong> its services <strong>to</strong> external services.Forces(a) The services that can potentially access the inven<strong>to</strong>ry are not known.(b) Structure <strong>of</strong> the inven<strong>to</strong>ry needs <strong>to</strong> be hidden.(c) The functionality <strong>of</strong> the inven<strong>to</strong>ry needs <strong>to</strong> be limited.(d) Access <strong>to</strong> the inven<strong>to</strong>ry needs <strong>to</strong> be secured.Solution Inven<strong>to</strong>ry Endpoint establishes an entry point for external serviceconsumers. Each cus<strong>to</strong>mer accessing service reposi<strong>to</strong>ry, access the endpointand receives information from the endpoint. Capabilities <strong>of</strong> endpointscan be extended by for instance direct / brokered authentication. A singleInven<strong>to</strong>ry can have more than one endpoint.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!