Enterprise development reference architecture (EDRA) -Deepti Seelamsetti.

Slides:



Advertisements
Similar presentations
3 Copyright © 2005, Oracle. All rights reserved. Designing J2EE Applications.
Advertisements

Chapter 13 Review Questions
Applying the SOA RA Utah Public Safety ESB Project Utah Department of Technology Services April 10, 2008 Prepared by Robert Woolley.
ARCH-01: Introduction to the OpenEdge™ Reference Architecture Don Sorcinelli Applied Technology Group.
Copyright © 2008 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Andrew Stone Common Security.
Building Enterprise Applications Using Visual Studio ®.NET Enterprise Architect.
Leveraging Enterprise Library in Your Applications Keith Elder Quicken Loans Manager, Sr. Software Engineer Microsoft MVP Keith a t keithelder dot net.
Overview of Databases and Transaction Processing Chapter 1.
SOA Basics SSE USTC Qing Ding. Topics Quick introduction to SOA Composite applications Services and SOA.
MITP 458 Application Layer Security By Techjocks.
Software Factory Assembling Applications with Models, Patterns, Frameworks and Tools Anna Liu Senior Architect Advisor Microsoft Australia.
CS 290C: Formal Models for Web Software Lecture 6: Model Driven Development for Web Software with WebML Instructor: Tevfik Bultan.
Patterns & practices Enterprise Library Brian Button Consultant/Developer patterns & practices.
Software Engineering Module 1 -Components Teaching unit 3 – Advanced development Ernesto Damiani Free University of Bozen - Bolzano Lesson 2 – Components.
Systems Integration & Consulting June Copyright ® 2009 Ayenda Agenda Introduction to Systems Integration System Integration Challenges and Opportunities.
Software Architecture April-10Confidential Proprietary Master Data Management mainly inspired from Enterprise Master Data Management – An SOA approach.
Ravi Sankar Technology Evangelist | Microsoft Corporation
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse 2.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
“Behind the Scenes” of the Enterprise Development Reference Architecture (EDRA) Jonathan Wanagel Microsoft patterns & practices
Introduction to the Enterprise Library. Sounds familiar? Writing a component to encapsulate data access Building a component that allows you to log errors.
Software Engineering Muhammad Fahad Khan
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
Methodology and Tools for End-to-End SOA Configurations By: Fumiko satoh, Yuichi nakamura, Nirmal K. Mukhi, Michiaki Tatsubori, Kouichi ono.
©2004 Avanade Inc. All rights reserved. The Avanade name and logo are registered trademarks in the US and other countries. Enterprise Library v1.0 A Technical.
Discovering 10232A – Designing and Developing Microsoft SharePoint Server 2010 Applications Robert Bogue.
Architecture Of ASP.NET. What is ASP?  Server-side scripting technology.  Files containing HTML and scripting code.  Access via HTTP requests.  Scripting.
Todd Snyder Development Team Lead Infragistics Experience Design Group.
Wireless Networks Breakout Session Summary September 21, 2012.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 09. Review Introduction to architectural styles Distributed architectures – Client Server Architecture – Multi-tier.
Service Oriented Architectures Presentation By: Clifton Sweeney November 3 rd 2008.
Alcatel-Lucent CDC Workshop, Coaching & Knowledge Transfer Architecture.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Middleware for FIs Apeego House 4B, Tardeo Rd. Mumbai Tel: Fax:
Architectural pattern: Interceptor Source: POSA II pp 109 – 140POSA II Environment: developing frameworks that can be extended transparently Recurring.
Service Oriented Architecture CCT355H5 Professor Michael Jones Suezan Makkar.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Rational Unified Process Fundamentals Module 7: Process for e-Business Development Rational Unified Process Fundamentals Module 7: Process for e-Business.
Infrastructure Service Approach to Handling Security in Service-Oriented Architecture Business Applications Doina Iepuras.
Presented by Vishy Grandhi.  Architecture (Week 1) ◦ Development Environments ◦ Model driven architecture ◦ Licensing and configuration  AOT (Week 2)
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 JSP Application Models.
FIPA Abstract Architecture London FIPA meeting January 24-29, 2000 from: TC-A members.
MVC WITH CODEIGNITER Presented By Bhanu Priya.
Portals: Architecture & Best Practices Greg Hinkle February 2005.
Secure middleware patterns E.B.Fernandez. Middleware security Architectures have been studied and several patterns exist Security aspects have not been.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
EMEA Beat Schwegler Architect Microsoft EMEA HQ Ingo Rammer Principal Consultant thinktecture
OSG Storage VDT Support and Troubleshooting Concerns Tanya Levshina.
Architecting Real-World Enterprise Application. Agenda CPR - Background Challenges in the Architecture Architecture Details Q & A Summary.
Packaging Design and Architecture Guidance for Visual Studio Tom Hollander Wojtek Kozaczynski Harry Pierson Microsoft.
Software Architecture Architecture represents different things from use cases –Use cases deal primarily with functional properties –Architecture deals.
A Web Service Software Factory Introduction Don Smith Product Manager patterns & practices.
Chapter 1 Overview of Databases and Transaction Processing.
Enterprise Library 3.0 Memi Lavi Solution Architect Microsoft Consulting Services Guy Burstein Senior Consultant Advantech – Microsoft Division.
Building Enterprise Applications Using Visual Studio®
IST421: Advanced Systems and Enterprise Integration
Design Patterns: MORE Examples
EI Architecture Overview/Current Assessment/Technical Architecture
Enterprise Library Overview
Model-View-Controller Patterns and Frameworks
Patterns.
Security & .NET 12/1/2018.
3 Cloud Computing.
An Introduction to Software Architecture
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Chapter 8, Design Patterns Introduction
FRAMEWORKS AND REUSE What is “Framework”?
Mark Quirk Head of Technology Developer & Platform Group
Demo for Partners and Customers
Presentation transcript:

Enterprise development reference architecture (EDRA) -Deepti Seelamsetti

Agenda  Current challenges in building enterprise class applications.  Best practices and Patterns  EDRA What is EDRA? What is EDRA? EDRA High Level Logical view EDRA High Level Logical view EDRA Pipeline Flow EDRA Pipeline Flow Application Blocks Application Blocks  Summary

Challenges in Enterprise Application Development  Complex data  Multiple simultaneous users  Varying business requirements  Heterogeneous platforms.

Best practices and patterns  What is a pattern? A pattern is a form, template, or model (or, more abstractly, a set of rules) which can be used to make or to generate things or parts of a thing, especially if the things that are generated have enough in common for the underlying pattern to be inferred or discerned, in which case the things are said to exhibit the pattern. A pattern is a form, template, or model (or, more abstractly, a set of rules) which can be used to make or to generate things or parts of a thing, especially if the things that are generated have enough in common for the underlying pattern to be inferred or discerned, in which case the things are said to exhibit the pattern.

Best practices and patterns  What is a pattern? Describes a problem which occurs over and over again in our environment, and then describes the core of the solution to that problem, in such a way that you can use this solution a million times over, without ever doing it the same way twice. Describes a problem which occurs over and over again in our environment, and then describes the core of the solution to that problem, in such a way that you can use this solution a million times over, without ever doing it the same way twice.

EDRA  EDRA provides architectural guidelines that an organization can use to standardize the development of distributed applications.

EDRA Guiding Principles  Separation of Concerns Separating the service interface from the internal service implementation. Separating the service interface from the internal service implementation. Separating business logic from cross-cutting concerns such as logging, monitoring, or raising business events. Separating business logic from cross-cutting concerns such as logging, monitoring, or raising business events. Separating business logic from the underlying transport so that multiple transports can be used to access a single service implementation. Separating business logic from the underlying transport so that multiple transports can be used to access a single service implementation.  Benefits Leverage strengths of different types of developers. Leverage strengths of different types of developers. Preserves business logic through changes to “plumbing”. Preserves business logic through changes to “plumbing”.

EDRA Framework (EDAF)  is one possible implementation of the conceptual architecture.  Enterprise Development Application Framework (EDAF) is one possible implementation of the conceptual architecture.  Frameworks are useful for: Productivity: Frameworks standardize the way in which a class of problems is solved. Time to market: Increased productivity due to the need to develop and test only code that is related to business requirements. Predictability: Reusable, tested solutions based on a predefined architecture reduce risk and increase the predictability of the development process.

Life in the Pipeline

EDRA-Application Blocks  Application blocks are a type of guidance, provided as source code that can be used "as is," extended, or modified by developers to use on enterprise development projects. Application BlockDescription Caching Application Block This application block allows developers to incorporate a local cache in their applications. Configuration Application Block This application block allows applications to read and write configuration information. Data Access Application Block This application block allows developers to incorporate standard database functionality in their applications. Cryptography Application Block This application block allows developers to include encryption and hashing functionality in their applications. Exception Handling Application Block This application block allows developers and policy makers to create a consistent strategy for processing exceptions that occur throughout the architectural layers of enterprise applications. Logging and Instrumentation Application Block This application block allows developers to incorporate standard logging and instrumentation functionality in their applications. Security Application Block This application block allows developers to incorporate security functionality in their applications. Applications can use the application block in a variety of situations, such as authenticating and authorizing users against a database, retrieving role and profile information, and caching user profile information.

Summary  EDRA is one model for building distributed applications with the following characteristics: Enterprise scale projects Enterprise scale projects Advanced architecture Advanced architecture Large, diverse, and distributed development teams Large, diverse, and distributed development teams  Includes an extensible application framework that incorporates reusable assets allowing you to use: ASP.NET Web services ASP.NET Web services Message Queuing Message Queuing Enterprise Services Enterprise Services  Brings together patterns & practices guidance: Design patterns Design patterns Application blocks Application blocks Security and performance guidance Security and performance guidance

Benefits Frameworks standardize the way in which a class of problems is solved. Productivity: Frameworks standardize the way in which a class of problems is solved. Increased productivity due to the need to develop and test only code that is related to business requirements. Time to market: Increased productivity due to the need to develop and test only code that is related to business requirements. Reusable, tested solutions based on a predefined architecture reduce risk and increase the predictability of the development process. Predictability: Reusable, tested solutions based on a predefined architecture reduce risk and increase the predictability of the development process.

What EDRA Is Not  EDRA is not a supported Microsoft product. EDRA is architectural guidance provided in the form of code which you can use “as-is”. EDRA is architectural guidance provided in the form of code which you can use “as-is”. Support: EDRA is considered “user-written code” by product support. Support: EDRA is considered “user-written code” by product support. Compatibility: EDRA is not guaranteed to be forward or backward compatible. Compatibility: EDRA is not guaranteed to be forward or backward compatible. Localization: EDRA is not localized. Localization: EDRA is not localized.  EDRA is not the only “right” way to build distributed applications.  EDRA is not the Microsoft reference architecture for building service oriented applications. EDRA can be used for building any kind of distributed application. EDRA can be used for building any kind of distributed application. Much of what EDRA does is orthogonal to service orientation. Much of what EDRA does is orthogonal to service orientation.