Download Overview of modular system generation

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

SIP extensions for the IP Multimedia Subsystem wikipedia , lookup

Transcript
The overview
How the open market
works
Players and Bodies

The main players are
– The component supplier
 Document
 Binary
– The authorized supplier agent
– The Institute
 Document
bank
 Binary bank
–
–
–
–
The
The
The
The
authorized repository caretaker
component consumer
authorized consumer agent
authorized tool supplier
 tool
Other players
 Users
are component suppliers or
component consumers
 UserManagers are users that may
change user credentials and user
roles
 AccountManagers are users that
may change account specification
documents
 PowerUsers are trusted users that
have rights comparable with the
rights of agents
Tools & tool vendors
Tools must be authorized
 Tools must comply with the standards that
define the structure of the formatted
specification documents
 The interfaces of components and the
implemented event mechanisms must
comply with standards
 The interfaces of the supporting operating
services and the interaction with these
services must conform to standards

The picture
multiple
Repository
one
Supplier
Consumer
The Institute
Agent
tools
Documents
Binaries
Services
Currency
Agent
tools
Exporting Documents &
Binaries
Repository
Supplier
Documents
& Binaries
Agent
Consumer
The Institute
Documents
Binaries
Currency
Agent
Exporting Documents &
Binaries
Repository
Supplier
Consumer
Documents
The Institute
Documents
Agent
Binaries
Binaries
Currency
Agent
Exporting Documents &
Binaries
The documents will be checked by the
agent
 The binaries will be tested under
supervision of the agent
 The binaries are accompanied by supplier
information
 The agent places documents in the
document bank and via the document
bank, in one or more repositories
 The agent places binaries and supplier
information in the binary bank

The System Architect
Repository
Supplier
Browse and
retrieve
documents
Consumer
The Institute
Agent
Documents
Binaries
Currency
Agent
System Design






The system architect uses a dedicated search
engine to find usable specification documents
Or he browses one or more repositories for
usable component specification documents
If he wants to build a prototype, he sends a
request for binaries to a consumer agent
The agent retrieves the binaries from the
binary bank and combines them with
operating services
The consumer pays the currency bank for the
binaries and the services
Then the agent supplies the binary library
The Request
Repository
Supplier
Consumer
Request for
binaries
The Institute
Agent
Documents
Binaries
Currency
Agent
Agent Retrieves Binaries
Repository
Supplier
Consumer
Binaries
The Institute
Agent
Documents
Binaries
Currency
Agent
Consumer Pays Currency Bank
Repository
Supplier
Consumer
Payment
The Institute
Agent
Documents
Binaries
Currency
Agent
Currency Bank Informs Agent
Repository
Supplier
Consumer
Messag
e
The Institute
Agent
Documents
Binaries
Currency
Agent
The Agent Delivers the Library
Repository
Supplier
Consumer
Library
The Institute
Agent
Documents
Binaries
Currency
Agent
Final Release
 When
the system integrator reaches
his final release, he informs the
agent.
 The agent informs the currency bank
 All stakeholders will get paid out of
the currency bank
The Payment
Repository
Supplier
Consumer
The Institute
Agent
Documents
Binaries
Currency
Agent
Other details
Integrity, security
and scalability
Document integrity
 The
central organization keeps copies
of all formatted documents in the
document bank
 Documents that go to repositories
are derived from documents that are
stored in the central document bank
 The central organization keeps track
of all transfers of documents to
repositories
Document handling
 Some
documents are adapted before
they are sent to a repository
 Once uploaded, formatted
specifications of design items can
never be changed or removed
 Users may download documents
from repositories or via client tools
Binary integrity
 The
central organization keeps all
uploaded binaries in the binary bank
 Once uploaded, binaries can never
be changed or removed
 Authorized users may request the
download of binaries via the web
service of the central organization
Price
All services have a price
 For simple services the user may
download a price list
 For complex services a price preview can
be obtained
 The account of the user is checked before
the service performs its action
 When the service succeeds, the account of
the user is charged
 Subsequently all stakeholders get paid

Accounting and security



Users are connected to accounts
Some types of users have their own account
Each user has a
– Username
– Password
– Role



The same user-name may occur under
different accounts where the user may have a
different role and a different password
Within an account usernames are unique and
the username is connected to a single role and
a single password
Access to services and tool functions is
controlled by role-based user authorization
and authentication
Accounts
 Several
accounts are possible
– Agent
– PowerUser
– Supplier
– Consumer
– ConsumerGroup
– ConsumerProject
A
ConsumerProject account has a
limited livetime
User roles
User roles are connected with access
levels
 Some roles have the same levels
 Possible roles are

–
–
–
–
–
–
–
SuperUser
Agent
PowerUser
AccountManager
UserManager
User
Guest
Communication
 Communication
between tools and
services is based on compression
combined with encryption
 Encryption is based on the AES
standard
Protocol details
 The
encryption uses a temporary key
that is derived from a one-time
session guid
 The transferred content is used in
the generation of a trail of new keys
that are used to encrypt the next
part of the message
 This combination provides an
unbreakable encrypted and fast
communication protocol
Access guard
The communication is also guarded by role
based user authorization and user
authentication
 The SoapRequestContext of the web
service is used to implement user
authorization and user authentication
 The accessed service function checks
access rights for the user role
 An efficient remoting user database server
assists the web service in managing user
data

Search machine
One or more search terms attach to each
uploaded design item
 These search terms are collected in a
search base
 The search base may be downloaded
 A local or remote search machine uses
logical combinations of search terms to
construct sets of references to design
items that fulfill the search criteria
 The publications of these design items can
be viewed or downloaded

Configuration
Tools
Services
Repositories
Servers
Central Web Service
 Web
services handle the electronic
counters of the central
organization
 Each separate service requires its
own access level
 Users that have access to
appropriate client tools can access
these services
 Upload of documents to
repositories goes via the web
service of the central organization
Other Web Services
The central organization communicates
with repository caretakers via a dedicated
web service
 Users cannot directly access this service
 The central organization communicates
with a financial service that takes care of
the electronic payments via a dedicated
web service
 The central organization uses the financial
service to check its financial transactions
 Users cannot directly access this web
service

Repositories
 Repositories
are trees of folders that
contain sub-folders, formatted
specification documents and free
formatted documents
 Repositories have a defined structure
 Repositories can be web based or
they can reside on a local file system
Repository characteristics
 Repositories
contain an integrated
navigation and categorization utility
 The categorization utility supports
the search for candidate specification
documents
 Web based repositories are managed
by a repository caretaker
Servers
The web services use an internet server
 Other servers operate locally or via a local
area network
 The central organization uses these
servers to offer prompt and concurrent
access to user data, to accounting data
and to the search database
 In this way the required scalability can be
guaranteed
