Presentation is loading. Please wait.

Presentation is loading. Please wait.

The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.

Similar presentations


Presentation on theme: "The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier."— Presentation transcript:

1 The overview How the open market works

2 Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier agent –The Institute  Document bank  Binary bank –The authorized repository caretaker –The component consumer –The authorized consumer agent –The authorized tool supplier  tool

3 Other players  Users are component suppliers or component consumers  UserManagers are users that may change user credentials and user roles  AccountManagers are users that may change account specification documents  PowerUsers are trusted users that have rights comparable with the rights of agents

4 Tools & tool vendors  Tools must be authorized  Tools must comply with the standards that define the structure of the formatted specification documents  The interfaces of components and the implemented event mechanisms must comply with standards  The interfaces of the supporting operating services and the interaction with these services must conform to standards

5 The picture Supplier Agent tools Repository The Institute DocumentsBinariesCurrency Services Consumer Agent tools one multiple

6 SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency Exporting Documents & Binaries Documents & Binaries

7 SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency Exporting Documents & Binaries Documents Binaries

8 Exporting Documents & Binaries  The documents will be checked by the agent  The binaries will be tested under supervision of the agent  The binaries are accompanied by supplier information  The agent places documents in the document bank and via the document bank, in one or more repositories  The agent places binaries and supplier information in the binary bank

9 SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency The System Architect Browse and retrieve documents

10 System Design  The system architect uses a dedicated search engine to find usable specification documents  Or he browses one or more repositories for usable component specification documents  If he wants to build a prototype, he sends a request for binaries to a consumer agent  The agent retrieves the binaries from the binary bank and combines them with operating services  The consumer pays the currency bank for the binaries and the services  Then the agent supplies the binary library

11 SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency The Request Request for binaries

12 SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency Agent Retrieves Binaries Binaries

13 SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency Consumer Pays Currency Bank Payment

14 SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency Currency Bank Informs Agent Messag e

15 SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency The Agent Delivers the Library Library

16 Final Release  When the system integrator reaches his final release, he informs the agent.  The agent informs the currency bank  All stakeholders will get paid out of the currency bank

17 SupplierConsumer Agent Repository The Institute DocumentsBinariesCurrency The Payment

18 Other details Integrity, security and scalability

19 Document integrity  The central organization keeps copies of all formatted documents in the document bank  Documents that go to repositories are derived from documents that are stored in the central document bank  The central organization keeps track of all transfers of documents to repositories

20 Document handling  Some documents are adapted before they are sent to a repository  Once uploaded, formatted specifications of design items can never be changed or removed  Users may download documents from repositories or via client tools

21 Binary integrity  The central organization keeps all uploaded binaries in the binary bank  Once uploaded, binaries can never be changed or removed  Authorized users may request the download of binaries via the web service of the central organization

22 Price  All services have a price  For simple services the user may download a price list  For complex services a price preview can be obtained  The account of the user is checked before the service performs its action  When the service succeeds, the account of the user is charged  Subsequently all stakeholders get paid

23 Accounting and security  Users are connected to accounts  Some types of users have their own account  Each user has a –Username –Password –Role  The same user-name may occur under different accounts where the user may have a different role and a different password  Within an account usernames are unique and the username is connected to a single role and a single password  Access to services and tool functions is controlled by role-based user authorization and authentication

24 Accounts  Several accounts are possible –Agent –PowerUser –Supplier –Consumer –ConsumerGroup –ConsumerProject  A ConsumerProject account has a limited livetime

25 User roles  User roles are connected with access levels  Some roles have the same levels  Possible roles are –SuperUser –Agent –PowerUser –AccountManager –UserManager –User –Guest

26 Communication  Communication between tools and services is based on compression combined with encryption  Encryption is based on the AES standard

27 Protocol details  The encryption uses a temporary key that is derived from a one-time session guid  The transferred content is used in the generation of a trail of new keys that are used to encrypt the next part of the message  This combination provides an unbreakable encrypted and fast communication protocol

28 Access guard  The communication is also guarded by role based user authorization and user authentication  The SoapRequestContext of the web service is used to implement user authorization and user authentication  The accessed service function checks access rights for the user role  An efficient remoting user database server assists the web service in managing user data

29 Search machine  One or more search terms attach to each uploaded design item  These search terms are collected in a search base  The search base may be downloaded  A local or remote search machine uses logical combinations of search terms to construct sets of references to design items that fulfill the search criteria  The publications of these design items can be viewed or downloaded

30 Configuration Tools Services RepositoriesServers

31 Central Web Service  Web services handle the electronic counters of the central organization  Each separate service requires its own access level  Users that have access to appropriate client tools can access these services  Upload of documents to repositories goes via the web service of the central organization

32 Other Web Services  The central organization communicates with repository caretakers via a dedicated web service  Users cannot directly access this service  The central organization communicates with a financial service that takes care of the electronic payments via a dedicated web service  The central organization uses the financial service to check its financial transactions  Users cannot directly access this web service

33 Repositories  Repositories are trees of folders that contain sub-folders, formatted specification documents and free formatted documents  Repositories have a defined structure  Repositories can be web based or they can reside on a local file system

34 Repository characteristics  Repositories contain an integrated navigation and categorization utility  The categorization utility supports the search for candidate specification documents  Web based repositories are managed by a repository caretaker

35 Servers  The web services use an internet server  Other servers operate locally or via a local area network  The central organization uses these servers to offer prompt and concurrent access to user data, to accounting data and to the search database  In this way the required scalability can be guaranteed


Download ppt "The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier."

Similar presentations


Ads by Google