Download presentation
Presentation is loading. Please wait.
Published byJoanna Park Modified over 9 years ago
1
The overview How the open market works
2
Players and Bodies The main players are –The component supplier Document Binary –The authorized supplier agent –The Institute Document bank Binary bank –The authorized repository caretaker –The component consumer –The authorized consumer agent –The authorized tool supplier tool
3
Other players Users are component suppliers or component consumers UserManagers are users that may change user credentials and user roles AccountManagers are users that may change account specification documents PowerUsers are trusted users that have rights comparable with the rights of agents
4
Tools & tool vendors Tools must be authorized Tools must comply with the standards that define the structure of the formatted specification documents The interfaces of components and the implemented event mechanisms must comply with standards The interfaces of the supporting operating services and the interaction with these services must conform to standards
5
The picture Supplier Agent tools Repository The Institute DocumentsBinariesCurrency Services Consumer Agent tools one multiple
6
SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency Exporting Documents & Binaries Documents & Binaries
7
SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency Exporting Documents & Binaries Documents Binaries
8
Exporting Documents & Binaries The documents will be checked by the agent The binaries will be tested under supervision of the agent The binaries are accompanied by supplier information The agent places documents in the document bank and via the document bank, in one or more repositories The agent places binaries and supplier information in the binary bank
9
SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency The System Architect Browse and retrieve documents
10
System Design The system architect uses a dedicated search engine to find usable specification documents Or he browses one or more repositories for usable component specification documents If he wants to build a prototype, he sends a request for binaries to a consumer agent The agent retrieves the binaries from the binary bank and combines them with operating services The consumer pays the currency bank for the binaries and the services Then the agent supplies the binary library
11
SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency The Request Request for binaries
12
SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency Agent Retrieves Binaries Binaries
13
SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency Consumer Pays Currency Bank Payment
14
SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency Currency Bank Informs Agent Messag e
15
SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency The Agent Delivers the Library Library
16
Final Release When the system integrator reaches his final release, he informs the agent. The agent informs the currency bank All stakeholders will get paid out of the currency bank
17
SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency The Payment
18
Other details Integrity, security and scalability
19
Document integrity The central organization keeps copies of all formatted documents in the document bank Documents that go to repositories are derived from documents that are stored in the central document bank The central organization keeps track of all transfers of documents to repositories
20
Document handling Some documents are adapted before they are sent to a repository Once uploaded, formatted specifications of design items can never be changed or removed Users may download documents from repositories or via client tools
21
Binary integrity The central organization keeps all uploaded binaries in the binary bank Once uploaded, binaries can never be changed or removed Authorized users may request the download of binaries via the web service of the central organization
22
Price All services have a price For simple services the user may download a price list For complex services a price preview can be obtained The account of the user is checked before the service performs its action When the service succeeds, the account of the user is charged Subsequently all stakeholders get paid
23
Accounting and security Users are connected to accounts Some types of users have their own account Each user has a –Username –Password –Role The same user-name may occur under different accounts where the user may have a different role and a different password Within an account usernames are unique and the username is connected to a single role and a single password Access to services and tool functions is controlled by role-based user authorization and authentication
24
Accounts Several accounts are possible –Agent –PowerUser –Supplier –Consumer –ConsumerGroup –ConsumerProject A ConsumerProject account has a limited livetime
25
User roles User roles are connected with access levels Some roles have the same levels Possible roles are –SuperUser –Agent –PowerUser –AccountManager –UserManager –User –Guest
26
Communication Communication between tools and services is based on compression combined with encryption Encryption is based on the AES standard
27
Protocol details The encryption uses a temporary key that is derived from a one-time session guid The transferred content is used in the generation of a trail of new keys that are used to encrypt the next part of the message This combination provides an unbreakable encrypted and fast communication protocol
28
Access guard The communication is also guarded by role based user authorization and user authentication The SoapRequestContext of the web service is used to implement user authorization and user authentication The accessed service function checks access rights for the user role An efficient remoting user database server assists the web service in managing user data
29
Search machine One or more search terms attach to each uploaded design item These search terms are collected in a search base The search base may be downloaded A local or remote search machine uses logical combinations of search terms to construct sets of references to design items that fulfill the search criteria The publications of these design items can be viewed or downloaded
30
Configuration Tools Services RepositoriesServers
31
Central Web Service Web services handle the electronic counters of the central organization Each separate service requires its own access level Users that have access to appropriate client tools can access these services Upload of documents to repositories goes via the web service of the central organization
32
Other Web Services The central organization communicates with repository caretakers via a dedicated web service Users cannot directly access this service The central organization communicates with a financial service that takes care of the electronic payments via a dedicated web service The central organization uses the financial service to check its financial transactions Users cannot directly access this web service
33
Repositories Repositories are trees of folders that contain sub-folders, formatted specification documents and free formatted documents Repositories have a defined structure Repositories can be web based or they can reside on a local file system
34
Repository characteristics Repositories contain an integrated navigation and categorization utility The categorization utility supports the search for candidate specification documents Web based repositories are managed by a repository caretaker
35
Servers The web services use an internet server Other servers operate locally or via a local area network The central organization uses these servers to offer prompt and concurrent access to user data, to accounting data and to the search database In this way the required scalability can be guaranteed
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.