Service Proforma Middleware Workshop

advertisement
Service Proforma
Middleware Workshop
Notes
• Please complete as much of this proforma as
possible – it will help make the workshop more
informative & productive for us all.
• If you will be talking about more than one service
feel free to add an overall architecture diagram
showing the relationship between services.
• Also, please provide a motivation slide for
developing/using the service set.
Service: <name>
• <short description as to what the service
does>
• <availability of code/implementation>
– URL
– License
– Support?
• <SOA Model:WS/WS-GAF/WS-RF/Jini>
Service Operations
• <operation name>
– Description:
– IN: <arguments/data types in>
– OUT: <arguments/data types out>
• <REPEAT TO DESCRIBE SERVICE>
What do you use to build your service?
(i.e. How ‘standard’ is your service?)
NB:A low score means less risk & more mainstream
•
Widely Implemented Standard Specification (1pt)
– <Demonstrable Multiple Implementations, e.g. SOAP, WSDL>
•
Implemented draft specification (2pt)
– <Specification in standards body and supported by most/many companies. One/few
implementations exist (e.g., WS-Security, BPEL)>
•
•
•
Implemented draft specification (3pt)
– <Specification in standards body but alternatives exist. Industry is divided. One/few
implementations exist. (e.g., Transactions, coordination, notification, etc.).
Implemented proposal (4pt)
– An implementation of an idea, a proposal but not submitted to standards body yet (e.g.,
WS-Addressing, WS-Trust, etc.)
Non-implemented proposal (5pt)
– <An idea that exits as a white paper, but no code and no specification details>
•
Concept (6pt)
– <An idea that exists only as power point slides!!>
•
TOTAL: <List specs and add up!>
Service Dependencies
• What else does your service depend on (i.e.
external dependencies)?
–
–
–
–
RDBMs (e.g. service persistence)
Notification (e.g. callbacks to client)
Logging
Other services (name them)
• What does your implementation depend on?
– Languages (e.g. PERL, Java, .NET/C#)
– Container type
AAA & Security
• What authentication mechanism do you use?
– Bespoke? From the infrastructure?
• What authorisation mechanism do you use?
– Gridmap file, CAS, From service or infrastructure?
• What accounting mechanism do you use?
– Is interaction audited? Is usage run against quotas?
• Does service interaction need to be encrypted?
• If these are not used now, will they be in the future?
Exploiting the Service Architecture
• What features from your ‘plumbing’ do you use in
your service?
–
–
–
–
–
–
–
Factory port
Factory pattern
Logging
Event notification
Meta-data
Registry discovery/advertisement
Other OGSI/WSRF/WS/WS-GAF characteristics?
Service Activity
•
•
•
•
Multiple interaction or single user?
Throughput (1/per day or 100/per second?)
Typical data volume moved in
Typical data volume moved out
Service Failure
• Required Reliability
– Failure semantics?
• Positive ack
• Submit & forget
• Required Persistence
– Work never lost?
• Required Availability
– One of many or unique requirement
Required Service Management
• Remote access to:
– Performance
– Progress
– Diagnostic and repair interfaces
Download