Practical Software Architecture: Moving From System Context to Deployment by Tilak Mitra
Author:Tilak Mitra [Mitra, Tilak]
Language: eng
Format: epub
Tags: computers, Software Development & Engineering, General
ISBN: 9780133763126
Google: EbbxCgAAQBAJ
Publisher: IBM Press
Published: 2015-11-18T00:32:04.883550+00:00
Figure 8.15 COM for the Elixir system with identified DUs.
The PDUs are as follows:
⢠U_Browse_RTVâA PDU that allows corporate customers access to the real-time visualization interfaces.
⢠U_Browse_ReportsâA PDU that allows corporate customers access to the suite of business intelligence reports and their visual user interfaces.
⢠U_Priv_Browse_RTVâA PDU that allows corporate employees access to the real-time visualization interfaces.
⢠U_Priv_Browse_ReportâA PDU that allows corporate employees access to the suite of business intelligence reports and their visual user interfaces.
The DDUs are as follows:
⢠D_KPI_Insert_LocalâA DDU that represents the KPI data entity generated by the CN_RTAP node.
⢠D_KPI_Insert_AggregateâA DDU that represents rolled-up KPI values aggregated to each cycle of machine operations. This entity is persisted in the CN_EDW node.
⢠D_Rule_Output_InsertâA DDU that represents the data entity encapsulating the outcome of triggered business rules executed on the CN_BRMS node.
⢠D_Machine_Data_IngestâA DDU that encapsulates a message packet that enters the CN_RTAP node.
⢠D_WorkOrder_InsertâA DDU that represents a work order item that gets created in the CN_WOMS node.
⢠D_Machine_FailureModeâA DDU that represents an entity that gets retrieved from the CN_RCM node.
The EDUs are as follows:
⢠E_BrowseâAn EDU that is capacity sized to host the PDUs in the service centers.
⢠E_Priv_BrowseâAn EDU that is capacity sized to host the PDUs in the corporate offices.
⢠E_Create_KPIâAn EDU that is capacity sized to meet the service-level requirements of the CN_ODS node.
⢠E_Process_KPIâAn EDU that is capacity sized to meet the service-level requirements of the CN_RTAP node.
⢠E_Trigger_RuleâAn EDU that is capacity sized to meet the service-level requirements of the CN_BRMS node.
⢠E_Generate_ReportâAn EDU that is capacity sized to meet the service-level requirements of the CN_RS node.
⢠E_Process_SignOnâAn EDU that is capacity sized to meet the service-level requirements of the CN_PS node.
⢠E_Process_AuthâAn EDU that is capacity sized to meet the service-level requirements of the CN_DS node.
⢠E_KPI_TransferâAn EDU that is capacity sized to meet the service-level requirements of the CN_DTS node.
Note that no EDUs are identified for the nodes in the Back Office Zone. The reason is that the nodes in this zone already exist as a part of the corporate IT landscape, and hence, no further definition and design for its placement and capacity sizing are required. Again, I tried to keep things as simple as possibleâa mantra that I can chant as long as it may take for it to become imprinted into your architect DNA!
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7728)
Robo-Advisor with Python by Aki Ranin(7625)
Offensive Shellcode from Scratch by Rishalin Pillay(6105)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(5023)
Ego Is the Enemy by Ryan Holiday(4958)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
Python for ArcGIS Pro by Silas Toms Bill Parker(4183)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3889)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3626)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3285)
Speed Up Your Python with Rust by Maxwell Flitton(3231)
Liar's Poker by Michael Lewis(3223)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3195)
Extreme DAX by Michiel Rozema & Henk Vlootman(3172)
Agile Security Operations by Hinne Hettema(3124)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3109)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3083)
Cryptography Algorithms by Massimo Bertaccini(3001)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2983)
