SlideShare a Scribd company logo
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 01 June 2012 Page No.1-4
ISSN: 2278-2389
1
Study on Use Case Model for Service Oriented
Architecture Development
N.Sasikala, K.Rangarajan
Reseach Scholor, MTWU
Hod,Dept.of Mca,Bharath University.
Abstract- The recent trends in the computer industry are the one
and only thing i.e., web services. Because of the common
availability and open technologies web services are relevant to
all. Service-oriented architecture (SOA) helps organizations to
transform their business processes for high performance by
simplifying the underlying information systems. The most
challenging aspect of building successful software applications is
clearly understanding and specifying the requirements that an
application must satisfy. Use case modeling is an increasingly
popular approach for identifying and defining requirements for
software applications of all types. Use cases describe the
behavior of the system as its users interact with it. This approach
helps to place the software requirements in the framework of a
user doing some useful work with the system. This type of
approach helps to map software requirements to the relevant end-
user business processes, a very powerful concept. This paper
presents how the relationship between use case model and
Service oriented architecture.
Index Terms—Service Oriented Architecture, Component Based
Architecture, SOA entities, SOA characteristics, Use cases,
Relationships
I. INTRODUCTION TO SOA
Companies are inneed to integrate existing systems in order to
implement information technology (IT) support for their business
processes which cover all present and prospective systems
requirements needed to run the business end-to-end. A variety of
designs serve this kind of service ranging from rigid point-to-
point electronic data interchange (EDI) interactions to web
auctions. This will be donr by updating older technologies, for
example by Internet-enabling EDI-based systems, companies can
make their IT systems available to internal or external customers;
but the resulting systems have not proven flexible enough to
meet business demands, which require a flexible, standardized
architecture to better support the connection of various
applications and the sharing of data.SOA offers one such
prospective architecture. It unifies business processes by
structuring large applications as an ad hoc collection of smaller
modules called "services".
Service Oriented Architecture (SOA) can be defined as an
evolution of the Component Based Architecture, Interface Based
Design (Object Oriented) and Distributed Systems. A
Component Based Architecture is an architecture where the
functionality of the whole is divided into smaller functions, each
encapsulated in a component. A Distributed System is an
extension of components-based architecture and refers to
components that may exist in different physical locations.This
paper is organized as follows: Section 2 describes about the SOA
entities and its description.It also talks about the guiding
principles for the development, maintenance, and usage of the
SOA. Section 3 describes the necessity for software employees
to adopt SOA and the benefits which they can gain .Section 4
demonstrates about the use cases and its benefits of use cases.
Section 5 describes two different examples to talk about the
relationships between the use cases and SOA. Conclusions are
presented in Section 7.
II. SOA ENTITIES
SOA consists of the following six entities configured together to
support the find, bind, and execute paradigm The “find, bind, and
execute” paradigm as shown in Figure1 allows the consumer of a
service to ask a third-party registry for the service that matches
its criteria. If the registry has such a service, it gives the
consumer a contract and an endpoint address for the service
Figure 1:
Find
Bind and Execute
Register
Service Consumer
The service consumer is an application, service, or some other
type of software module that requires a service. It is the entity
that initiates the locating of the service in the registry, binding to
the service over a transport, and executing the service function.
The service consumer executes the service by sending it a
request formatted according to the contract.
Service Provider
The service provider is the service, that the network-addressable
entity that accepts and executes requests from consumers. It can
be a mainframe system, a component, or some other type of
software system that executes the service request. The service
Service
consumer
Registry
Contract
Service Provider
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 01 June 2012 Page No.1-4
ISSN: 2278-2389
2
provider publishes its contract in the registry for access by
service consumers.
Service Registry
A service registry is a network-based directory that contains
available services. It is an entity that accepts and stores contracts
from service providers and provides those contracts to interested
service consumers.
Service Contract
A contract is a specification of the way a consumer of a service
will interact with the provider of the service. It specifies the
format of the request and response from the service. A service
contract may require a set of preconditions and postconditions.
The preconditions and postconditions specify the state that the
service must be in to execute a particular function. The contract
may also specify quality of service (QoS) levels. QoS levels are
specifications for the nonfunctional aspects of the service. For
instance, a quality of service attribute is the amount of time it
takes to execute a service method.
Service Proxy
The service provider supplies a service proxy to the service
consumer. The service consumer executes the request by calling
an API function on the proxy. It then formats the request
message and executes the request on behalf of the consumer. The
service proxy is a convenience entity for the service
consumer.The service proxy can enhance performance by
caching remote references and data.When a proxy caches a
remote reference, subsequent service calls will not require
additional registry calls. By storing service contracts locally, the
consumer reduces the number of network hops required to
execute the service.
Service Lease
The service lease, which the registry grants the service
consumer, specifies the amount of time the contract is valid: only
from the time the consumer requests it from the registry to the
time specified by the lease (Sun Microsystems, Jini Technology
Core Specification, 2001). When the lease runs out, the
consumer must request a new lease from the registry.The lease is
necessary for services that need to maintain state information
about the binding between the consumer and provider. The lease
defines the time for which the state may be maintained
2.1 Principles
The following guiding principles define the ground rules for
development, maintenance, and usage of the SOA:
 Reuse, granularity, modularity, composability,
componentization, portability, and interoperability
 Standards compliance (both common and industry-
specific)
 Services identification and categorization, provisioning
and delivery, and monitoring and tracking
III. ESSENTIAL NEED FOR THE ADOPTION OF
SOA
In general the Information Technology (IT) workers face many
challenges like,
 Limited budgets for the modeling system.
 Constantly changing technologies.
 Evolving technologies for the same business function.
 Business requirements that demand applications and
technology silos that need to be integrated with each
other.
 Application functionality that must be extended to
reach outside an enterprise firewall
By these factors we can come for the conclusion that the system
require integration. For example, when a core banking system
must be accessed and used by customers through the Internet, a
demand is placed on the system to expose some of its
functionality to the application that drives the Internet access.If
the integration is always in native format (specific to an
application’s programming language or environment), then
integration projects will require a lot of custom integration work.
In addition, the ability to connect multiple systems together
quickly will require highly specialized programming capabilities
and knowledge of the nuances of the individual systems.
Because each enterprise application may be implemented on a
single server that provides the same functionality to many
clients, it makes sense to use common protocols to access the
functionality. IT staff can lower costs dramatically by using
common protocols and standards, and common methodologies
such as SOA.
Figure 2 shows the distinct philosophies of each step that
business has taken to adapt to requirements integration:
1. Vertical silos of integration – keeping all applications and
systems with similar functionality integrated with each other, but
not accounting for applications that may wish to use their core
functionality in the future.
2. Horizontal integration – integration of some but not all similar
functionality across vertical systems; for example using a
common purchasing system for raw materials, shipping needs
and office supplies.
3. The SOA – an environment of ubiquitous service providers
and service consumers interoperating with each other in a secure
and consistent manner.
Figure 2: Business views of system integration
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 01 June 2012 Page No.1-4
ISSN: 2278-2389
3
Many IT workers are placing requirements for this type of
integration on their software vendors. Most of the large and
medium-sized software vendors have either announced or
incorporated SOA methodology in their software.While the basic
patterns of integration remain the same, the specific technology
to implement it does vary, depending largely on the software
vendor.While the technical barriers to integration are easy to
overcome, there are vastly differing business policies and legal
aspects to be enforced at runtime, but no widely accepted
standards exist for them yet. Many software vendors continue to
pursue different methodologies and individual solutions for these
components of the SOA.
IV. USE CASES
Use cases are a powerful technique for capturing and
communicating functional requirements for software
development. A use case describes a set of possible executions of
the system. It describes a complete flow through the system until
the resulting value is achieved for some actor. I can be described
as follows:
• “Sequence of actions”: Atomic activities, decisions, and
requests. Each action is performed fully or not at all.
• “Performed by a system”: The actions performed by the
system are the functional requirements.
• “Observable result of value”: Make sure that the use case
results in an observable value. Why would anybody use the
system if it does not achieve a result of value? If nobody receives
value from the use case, then the use case is probably too small.
It needs to be combined with other use cases to provide a
complete set of steps for achieving some goal for an actor.
• “To an actor”: Decide which particular actor receives the
value and helps avoid use from declarative statements in two
primary ways. They describe functional requirements from the
user perspective rather than the system perspective, and they
provide a coherent goal focused flow of events rather than a set
of discrete declarative statements.
V. RELATIONSHIP BETWEEN SOA AND
USECASE MODEL
In formulating an SOA, we can start with operation. Here the
focus is how end users, systems, or applications use services.
Use cases in Unified Modeling Language (UML) [5] describe the
external behavior of a service as seen or utilized by an actor
(user, system, or application). The boundary of the service in a
use case is clearly delineated. The interaction of the actor with
the service is described without revealing the internal details of
the service. Use case is, therefore, a natural tool for describing
operational activities in an SOA.Based on the operational
concept, the scope of services, and the high-level requirements,
one may identify a set of high-level critical use cases. These are
the use cases that the architecture must support to meet the
minimal requirements. Use cases are not requirements.
Nevertheless, they illustrate what functions architecture provides
and highlight the requirements. Therefore, use cases are the first
step in formulating an SOA (see Figure 3).
Figure 3: Formulating an SOA
In each use case, typically two or more nodes interact with each
other by exchanging information. If a node is a service
consumer, then it is an actor in the use case for that service. If it
is a provider, then it is a component providing that service.
Traditionally, a node in the C4ISR framework represents a role,
an organization, an operational facility, etc. For an SOA, its
scope is expanded to include shared resources and services.
Hence a service node interacts with consumer nodes to provide
services. Use case and node are, therefore, the primary objects in
describing the operational aspects of an SOA, as shown in Figure
3.
Once the operational aspects are identified, the next action is to
find the solution that satisfies the operational requirements. In an
SOA, each service provides a set of well-defined functions useful
to its users, or consumers.
5.1 Operational View
let us consider an enterprise messaging system, in Command,
Control, Communications, Computers, Intelligence,
Surveillance, and Reconnaissance (C4ISR), which encompasses
e-mail, instant messaging (IM), chat, and presence services. The
critical use cases are send and receive emails and instant
messages, participate in a chat session, subscribe to and receive
presence notifications, etc. They are shown in the use case
diagram in Figure 4. In addition, the administrator configures
and administers the services
Figure 4: Use Cases as Part of the Activity Model for the
Enterprise Messaging System
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 01 June 2012 Page No.1-4
ISSN: 2278-2389
4
For each use case, you may describe a sequence of events or
activities. These activities may be presented in a hierarchy, as in
the standard activity model operational view .Here, however, the
use cases provide a natural grouping of those related activities.
Additionally, a use case highlights the actors and system/service
boundary, allowing you to delineate roles and nodes easily.
Hence, include use case as part of OV and consider it an
essential product for an SOA.
For an SOA, the use-case diagrams (such as Figure 4) often
identify the nodes. These nodes are roles, organizations, shared
resources, or service nodes. You can further draw the
connections (i.e., the need lines) between the nodes, thereby
forming the operational node connectivity description (OV). An
example is given in Figure 5.
Figure 5: Operational Node Connectivity Description for the
Enterprise Messaging System
Using UML techniques to supplement the traditional C4ISR
framework, I have elucidated an approach for formulating an
SOA. On the operational side, it starts with use cases, which
involve the interaction of two or more operational or service
nodes. Mission functions are provided through applications,
which are implemented by a set of services. The high-level
operational concept graphics still applies to an SOA. This,
operational views together encompasses the concepts of
operation, the use cases from user's viewpoint, the connectivity
between operational nodes, and their information exchanges.
They therefore characterize the essential operational aspects of
an SOA. Furthermore, since operational nodes include shared
resources and services, dynamic and collaborative operational
activities are properly captured
VI. CONCLUSIONS
By this paper I can also conclude that well-written use case
descriptions are a powerful technique for capturing and
communicating functional requirements in many software
development paradigms. In fact, many software development
organizations have adopted use case techniques for their
requirements management efforts on projects that are not object
oriented or using any other UML constructs. SOA is based on
the use of distributed objects and components and is the next
evolutionary step in computing environments. An SOA may also
implement optional concepts that include a service consumer, a
service client, acceptance of the service contract and invoking
the service.There are many business drivers affecting the
development of a standardized SOA reference model. Once this
is achieved, SOA will likely be part of the solution for many
business and world issues. They are by no means a silver bullet
for requirements and UI design, and they certainly have their
pitfalls, but overall they can be a powerful tool for most projects.
The secret is to keep it simple, and to involve the users right the
way along in the identification and design of use cases.
Remember that our aim is to eliminate rework due to
requirements misunderstandings, and so we should be aiming to
reach a point where there are no surprises for the users. Use
cases, in conjunction with SOA techniques help to build an
explicit shared understanding that everyone can take away with
them . users, developers, testers, technical authors, and others.
REFERENCES
[1] Bieber, G., and Carpenter, J. Introduction to Service-Oriented
Programming (Rev 2.1).
[2] www.openwings.org/download/specs/ServiceOrientedIntroduction.pdf,
accessed October 2002.
[3] Fowler, M. UML Distilled: Applying the Standard Object Modeling
Language.Addison-Wesley, 1997.
[4] Meyer, B. Object Oriented Software Construction. Prentice Hall, 1997,
pp. 39–48.
[5] Arsanjani, A.: Service-Oriented Modelling and Architecture (SOMA),
IBM developer-Works 2004,
[6] http://www.ibm.com/developerworks/webservices/library/ws-soa-design1
[7] Bass, L.; Clements, P.; Kazman, R.: Software Architecture in Practice,
Addison Wesley, 1998.
[8] [BRJ99] Booch, G.; Rumbaugh, J.; Jacobson, I.: The Unified Modeling
Language User Guide,1999
[9] Johnston, S.: UML 2.0 Profile for Software Services, IBM
developerWorks 2005,
[10] Zimmermann, O.; Milinski, M.; Craes, M.; Oellermann, F.: Second
Generation Web Services-Oriented Architecture in Production in the
Finance Industry, OOPSLA Conference Companion, 2004
[11] Zimmermann, O.; Doubrovski, V.; Grundler, J.; Hogg, K.: Service-
Oriented Architecture and Business Process Choreography in an Order
Management Scenario, OOPSLA Conference Companion, 2005
[12] U.S. Joint Forces Command. Global Information Grid Capstone
Requirements Document. JROCM 134-01. Norfolk, VA: USJFCOM,
Aug. 2001 https://jdl.jwfc.jfcom.mil/.
[13] C4ISR Architecture Working Group. C4ISR Architecture Framework
Vers. 2.0. Washington, D.C.: Department of Defense, 18 Dec. 1997
[14] www.fas.org/irp/program/core/fw.pdf. The next version is the DoD
Architecture Framework Vers. 1.0. 15 Aug. 2003 www.aitcnet.org/dodfw

More Related Content

Similar to Study on Use Case Model for Service Oriented Architecture Development (20)

PDF
A review of soa modeling approaches for enterprise information systems
Tiago Oliveira
 
PPT
Service Oriented Architecture
Sandeep Ganji
 
PPTX
Introduction to SOA
saeed shargi ghazani
 
PPTX
Service Oriented Architecture (SOA)
Mazhar Ishaq Khokhar
 
PPTX
Unit-III Service Oritented Architecture.pptx
jayakanthan8
 
PPTX
Unit-III Service Oritented Architecture.pptx
jayakanthan8
 
PPTX
SOA and Monolith Architecture - Micro Services.pptx
Kongu Engineering College, Perundurai, Erode
 
PDF
Service Oriented Architecture & Beyond
Imesh Gunaratne
 
PDF
542 546
Editor IJARCET
 
PDF
Lectura 2.3 soa-overview-directions-benatallah
Matias Menendez
 
PPTX
Unit-I-Introduction SOA basics MSA .PPTpptx
jayakanthan8
 
PPTX
Unit-I-Introductionwith MSA Explanation.pptx
jayakanthan8
 
PPT
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
AnyaForger34
 
PPTX
Lecture 2 - SOA
phanleson
 
PDF
Arquitectura orientada a servicios
brizna39
 
PDF
Cc unit 2 updated
Dr. Radhey Shyam
 
PDF
Evaluation of a Framework for Integrated Web Services
IRJET Journal
 
PDF
International Journal of Software Engineering & Applications(IJSEA)
sebastianku31
 
PDF
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
ijseajournal
 
PDF
Executive Overview Using Soa To Improve Operational Efficiency
sean.mcclowry
 
A review of soa modeling approaches for enterprise information systems
Tiago Oliveira
 
Service Oriented Architecture
Sandeep Ganji
 
Introduction to SOA
saeed shargi ghazani
 
Service Oriented Architecture (SOA)
Mazhar Ishaq Khokhar
 
Unit-III Service Oritented Architecture.pptx
jayakanthan8
 
Unit-III Service Oritented Architecture.pptx
jayakanthan8
 
SOA and Monolith Architecture - Micro Services.pptx
Kongu Engineering College, Perundurai, Erode
 
Service Oriented Architecture & Beyond
Imesh Gunaratne
 
Lectura 2.3 soa-overview-directions-benatallah
Matias Menendez
 
Unit-I-Introduction SOA basics MSA .PPTpptx
jayakanthan8
 
Unit-I-Introductionwith MSA Explanation.pptx
jayakanthan8
 
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
AnyaForger34
 
Lecture 2 - SOA
phanleson
 
Arquitectura orientada a servicios
brizna39
 
Cc unit 2 updated
Dr. Radhey Shyam
 
Evaluation of a Framework for Integrated Web Services
IRJET Journal
 
International Journal of Software Engineering & Applications(IJSEA)
sebastianku31
 
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAAS
ijseajournal
 
Executive Overview Using Soa To Improve Operational Efficiency
sean.mcclowry
 

More from ijbuiiir1 (20)

DOC
Facial Feature Recognition Using Biometrics
ijbuiiir1
 
DOCX
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
ijbuiiir1
 
DOC
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
ijbuiiir1
 
DOC
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
ijbuiiir1
 
DOCX
Vehicle to Vehicle Communication of Content Downloader in Mobile
ijbuiiir1
 
DOC
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
ijbuiiir1
 
DOC
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
ijbuiiir1
 
DOC
A Study on migrated Students and their Well - being using Amartya Sens Functi...
ijbuiiir1
 
DOC
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
ijbuiiir1
 
DOCX
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
ijbuiiir1
 
DOCX
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
ijbuiiir1
 
DOCX
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
ijbuiiir1
 
DOC
Stock Prediction Using Artificial Neural Networks
ijbuiiir1
 
DOC
Indian Language Text Representation and Categorization Using Supervised Learn...
ijbuiiir1
 
DOC
Highly Secured Online Voting System (OVS) Over Network
ijbuiiir1
 
DOC
Software Developers Performance relationship with Cognitive Load Using Statis...
ijbuiiir1
 
DOC
Wireless Health Monitoring System Using ZigBee
ijbuiiir1
 
DOC
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
ijbuiiir1
 
DOCX
Secured Cloud ERP
ijbuiiir1
 
DOC
Web Based Secure Soa
ijbuiiir1
 
Facial Feature Recognition Using Biometrics
ijbuiiir1
 
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
ijbuiiir1
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
ijbuiiir1
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
ijbuiiir1
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
ijbuiiir1
 
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
ijbuiiir1
 
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
ijbuiiir1
 
A Study on migrated Students and their Well - being using Amartya Sens Functi...
ijbuiiir1
 
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
ijbuiiir1
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
ijbuiiir1
 
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
ijbuiiir1
 
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
ijbuiiir1
 
Stock Prediction Using Artificial Neural Networks
ijbuiiir1
 
Indian Language Text Representation and Categorization Using Supervised Learn...
ijbuiiir1
 
Highly Secured Online Voting System (OVS) Over Network
ijbuiiir1
 
Software Developers Performance relationship with Cognitive Load Using Statis...
ijbuiiir1
 
Wireless Health Monitoring System Using ZigBee
ijbuiiir1
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
ijbuiiir1
 
Secured Cloud ERP
ijbuiiir1
 
Web Based Secure Soa
ijbuiiir1
 
Ad

Recently uploaded (20)

PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PPTX
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PDF
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PPTX
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
PPT
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PPTX
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
PPTX
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PDF
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
Thermal runway and thermal stability.pptx
godow93766
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
Hashing Introduction , hash functions and techniques
sailajam21
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
Design Thinking basics for Engineers.pdf
CMR University
 
Ad

Study on Use Case Model for Service Oriented Architecture Development

  • 1. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 01 Issue: 01 June 2012 Page No.1-4 ISSN: 2278-2389 1 Study on Use Case Model for Service Oriented Architecture Development N.Sasikala, K.Rangarajan Reseach Scholor, MTWU Hod,Dept.of Mca,Bharath University. Abstract- The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant end- user business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture. Index Terms—Service Oriented Architecture, Component Based Architecture, SOA entities, SOA characteristics, Use cases, Relationships I. INTRODUCTION TO SOA Companies are inneed to integrate existing systems in order to implement information technology (IT) support for their business processes which cover all present and prospective systems requirements needed to run the business end-to-end. A variety of designs serve this kind of service ranging from rigid point-to- point electronic data interchange (EDI) interactions to web auctions. This will be donr by updating older technologies, for example by Internet-enabling EDI-based systems, companies can make their IT systems available to internal or external customers; but the resulting systems have not proven flexible enough to meet business demands, which require a flexible, standardized architecture to better support the connection of various applications and the sharing of data.SOA offers one such prospective architecture. It unifies business processes by structuring large applications as an ad hoc collection of smaller modules called "services". Service Oriented Architecture (SOA) can be defined as an evolution of the Component Based Architecture, Interface Based Design (Object Oriented) and Distributed Systems. A Component Based Architecture is an architecture where the functionality of the whole is divided into smaller functions, each encapsulated in a component. A Distributed System is an extension of components-based architecture and refers to components that may exist in different physical locations.This paper is organized as follows: Section 2 describes about the SOA entities and its description.It also talks about the guiding principles for the development, maintenance, and usage of the SOA. Section 3 describes the necessity for software employees to adopt SOA and the benefits which they can gain .Section 4 demonstrates about the use cases and its benefits of use cases. Section 5 describes two different examples to talk about the relationships between the use cases and SOA. Conclusions are presented in Section 7. II. SOA ENTITIES SOA consists of the following six entities configured together to support the find, bind, and execute paradigm The “find, bind, and execute” paradigm as shown in Figure1 allows the consumer of a service to ask a third-party registry for the service that matches its criteria. If the registry has such a service, it gives the consumer a contract and an endpoint address for the service Figure 1: Find Bind and Execute Register Service Consumer The service consumer is an application, service, or some other type of software module that requires a service. It is the entity that initiates the locating of the service in the registry, binding to the service over a transport, and executing the service function. The service consumer executes the service by sending it a request formatted according to the contract. Service Provider The service provider is the service, that the network-addressable entity that accepts and executes requests from consumers. It can be a mainframe system, a component, or some other type of software system that executes the service request. The service Service consumer Registry Contract Service Provider
  • 2. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 01 Issue: 01 June 2012 Page No.1-4 ISSN: 2278-2389 2 provider publishes its contract in the registry for access by service consumers. Service Registry A service registry is a network-based directory that contains available services. It is an entity that accepts and stores contracts from service providers and provides those contracts to interested service consumers. Service Contract A contract is a specification of the way a consumer of a service will interact with the provider of the service. It specifies the format of the request and response from the service. A service contract may require a set of preconditions and postconditions. The preconditions and postconditions specify the state that the service must be in to execute a particular function. The contract may also specify quality of service (QoS) levels. QoS levels are specifications for the nonfunctional aspects of the service. For instance, a quality of service attribute is the amount of time it takes to execute a service method. Service Proxy The service provider supplies a service proxy to the service consumer. The service consumer executes the request by calling an API function on the proxy. It then formats the request message and executes the request on behalf of the consumer. The service proxy is a convenience entity for the service consumer.The service proxy can enhance performance by caching remote references and data.When a proxy caches a remote reference, subsequent service calls will not require additional registry calls. By storing service contracts locally, the consumer reduces the number of network hops required to execute the service. Service Lease The service lease, which the registry grants the service consumer, specifies the amount of time the contract is valid: only from the time the consumer requests it from the registry to the time specified by the lease (Sun Microsystems, Jini Technology Core Specification, 2001). When the lease runs out, the consumer must request a new lease from the registry.The lease is necessary for services that need to maintain state information about the binding between the consumer and provider. The lease defines the time for which the state may be maintained 2.1 Principles The following guiding principles define the ground rules for development, maintenance, and usage of the SOA:  Reuse, granularity, modularity, composability, componentization, portability, and interoperability  Standards compliance (both common and industry- specific)  Services identification and categorization, provisioning and delivery, and monitoring and tracking III. ESSENTIAL NEED FOR THE ADOPTION OF SOA In general the Information Technology (IT) workers face many challenges like,  Limited budgets for the modeling system.  Constantly changing technologies.  Evolving technologies for the same business function.  Business requirements that demand applications and technology silos that need to be integrated with each other.  Application functionality that must be extended to reach outside an enterprise firewall By these factors we can come for the conclusion that the system require integration. For example, when a core banking system must be accessed and used by customers through the Internet, a demand is placed on the system to expose some of its functionality to the application that drives the Internet access.If the integration is always in native format (specific to an application’s programming language or environment), then integration projects will require a lot of custom integration work. In addition, the ability to connect multiple systems together quickly will require highly specialized programming capabilities and knowledge of the nuances of the individual systems. Because each enterprise application may be implemented on a single server that provides the same functionality to many clients, it makes sense to use common protocols to access the functionality. IT staff can lower costs dramatically by using common protocols and standards, and common methodologies such as SOA. Figure 2 shows the distinct philosophies of each step that business has taken to adapt to requirements integration: 1. Vertical silos of integration – keeping all applications and systems with similar functionality integrated with each other, but not accounting for applications that may wish to use their core functionality in the future. 2. Horizontal integration – integration of some but not all similar functionality across vertical systems; for example using a common purchasing system for raw materials, shipping needs and office supplies. 3. The SOA – an environment of ubiquitous service providers and service consumers interoperating with each other in a secure and consistent manner. Figure 2: Business views of system integration
  • 3. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 01 Issue: 01 June 2012 Page No.1-4 ISSN: 2278-2389 3 Many IT workers are placing requirements for this type of integration on their software vendors. Most of the large and medium-sized software vendors have either announced or incorporated SOA methodology in their software.While the basic patterns of integration remain the same, the specific technology to implement it does vary, depending largely on the software vendor.While the technical barriers to integration are easy to overcome, there are vastly differing business policies and legal aspects to be enforced at runtime, but no widely accepted standards exist for them yet. Many software vendors continue to pursue different methodologies and individual solutions for these components of the SOA. IV. USE CASES Use cases are a powerful technique for capturing and communicating functional requirements for software development. A use case describes a set of possible executions of the system. It describes a complete flow through the system until the resulting value is achieved for some actor. I can be described as follows: • “Sequence of actions”: Atomic activities, decisions, and requests. Each action is performed fully or not at all. • “Performed by a system”: The actions performed by the system are the functional requirements. • “Observable result of value”: Make sure that the use case results in an observable value. Why would anybody use the system if it does not achieve a result of value? If nobody receives value from the use case, then the use case is probably too small. It needs to be combined with other use cases to provide a complete set of steps for achieving some goal for an actor. • “To an actor”: Decide which particular actor receives the value and helps avoid use from declarative statements in two primary ways. They describe functional requirements from the user perspective rather than the system perspective, and they provide a coherent goal focused flow of events rather than a set of discrete declarative statements. V. RELATIONSHIP BETWEEN SOA AND USECASE MODEL In formulating an SOA, we can start with operation. Here the focus is how end users, systems, or applications use services. Use cases in Unified Modeling Language (UML) [5] describe the external behavior of a service as seen or utilized by an actor (user, system, or application). The boundary of the service in a use case is clearly delineated. The interaction of the actor with the service is described without revealing the internal details of the service. Use case is, therefore, a natural tool for describing operational activities in an SOA.Based on the operational concept, the scope of services, and the high-level requirements, one may identify a set of high-level critical use cases. These are the use cases that the architecture must support to meet the minimal requirements. Use cases are not requirements. Nevertheless, they illustrate what functions architecture provides and highlight the requirements. Therefore, use cases are the first step in formulating an SOA (see Figure 3). Figure 3: Formulating an SOA In each use case, typically two or more nodes interact with each other by exchanging information. If a node is a service consumer, then it is an actor in the use case for that service. If it is a provider, then it is a component providing that service. Traditionally, a node in the C4ISR framework represents a role, an organization, an operational facility, etc. For an SOA, its scope is expanded to include shared resources and services. Hence a service node interacts with consumer nodes to provide services. Use case and node are, therefore, the primary objects in describing the operational aspects of an SOA, as shown in Figure 3. Once the operational aspects are identified, the next action is to find the solution that satisfies the operational requirements. In an SOA, each service provides a set of well-defined functions useful to its users, or consumers. 5.1 Operational View let us consider an enterprise messaging system, in Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR), which encompasses e-mail, instant messaging (IM), chat, and presence services. The critical use cases are send and receive emails and instant messages, participate in a chat session, subscribe to and receive presence notifications, etc. They are shown in the use case diagram in Figure 4. In addition, the administrator configures and administers the services Figure 4: Use Cases as Part of the Activity Model for the Enterprise Messaging System
  • 4. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 01 Issue: 01 June 2012 Page No.1-4 ISSN: 2278-2389 4 For each use case, you may describe a sequence of events or activities. These activities may be presented in a hierarchy, as in the standard activity model operational view .Here, however, the use cases provide a natural grouping of those related activities. Additionally, a use case highlights the actors and system/service boundary, allowing you to delineate roles and nodes easily. Hence, include use case as part of OV and consider it an essential product for an SOA. For an SOA, the use-case diagrams (such as Figure 4) often identify the nodes. These nodes are roles, organizations, shared resources, or service nodes. You can further draw the connections (i.e., the need lines) between the nodes, thereby forming the operational node connectivity description (OV). An example is given in Figure 5. Figure 5: Operational Node Connectivity Description for the Enterprise Messaging System Using UML techniques to supplement the traditional C4ISR framework, I have elucidated an approach for formulating an SOA. On the operational side, it starts with use cases, which involve the interaction of two or more operational or service nodes. Mission functions are provided through applications, which are implemented by a set of services. The high-level operational concept graphics still applies to an SOA. This, operational views together encompasses the concepts of operation, the use cases from user's viewpoint, the connectivity between operational nodes, and their information exchanges. They therefore characterize the essential operational aspects of an SOA. Furthermore, since operational nodes include shared resources and services, dynamic and collaborative operational activities are properly captured VI. CONCLUSIONS By this paper I can also conclude that well-written use case descriptions are a powerful technique for capturing and communicating functional requirements in many software development paradigms. In fact, many software development organizations have adopted use case techniques for their requirements management efforts on projects that are not object oriented or using any other UML constructs. SOA is based on the use of distributed objects and components and is the next evolutionary step in computing environments. An SOA may also implement optional concepts that include a service consumer, a service client, acceptance of the service contract and invoking the service.There are many business drivers affecting the development of a standardized SOA reference model. Once this is achieved, SOA will likely be part of the solution for many business and world issues. They are by no means a silver bullet for requirements and UI design, and they certainly have their pitfalls, but overall they can be a powerful tool for most projects. The secret is to keep it simple, and to involve the users right the way along in the identification and design of use cases. Remember that our aim is to eliminate rework due to requirements misunderstandings, and so we should be aiming to reach a point where there are no surprises for the users. Use cases, in conjunction with SOA techniques help to build an explicit shared understanding that everyone can take away with them . users, developers, testers, technical authors, and others. REFERENCES [1] Bieber, G., and Carpenter, J. Introduction to Service-Oriented Programming (Rev 2.1). [2] www.openwings.org/download/specs/ServiceOrientedIntroduction.pdf, accessed October 2002. [3] Fowler, M. UML Distilled: Applying the Standard Object Modeling Language.Addison-Wesley, 1997. [4] Meyer, B. Object Oriented Software Construction. Prentice Hall, 1997, pp. 39–48. [5] Arsanjani, A.: Service-Oriented Modelling and Architecture (SOMA), IBM developer-Works 2004, [6] http://www.ibm.com/developerworks/webservices/library/ws-soa-design1 [7] Bass, L.; Clements, P.; Kazman, R.: Software Architecture in Practice, Addison Wesley, 1998. [8] [BRJ99] Booch, G.; Rumbaugh, J.; Jacobson, I.: The Unified Modeling Language User Guide,1999 [9] Johnston, S.: UML 2.0 Profile for Software Services, IBM developerWorks 2005, [10] Zimmermann, O.; Milinski, M.; Craes, M.; Oellermann, F.: Second Generation Web Services-Oriented Architecture in Production in the Finance Industry, OOPSLA Conference Companion, 2004 [11] Zimmermann, O.; Doubrovski, V.; Grundler, J.; Hogg, K.: Service- Oriented Architecture and Business Process Choreography in an Order Management Scenario, OOPSLA Conference Companion, 2005 [12] U.S. Joint Forces Command. Global Information Grid Capstone Requirements Document. JROCM 134-01. Norfolk, VA: USJFCOM, Aug. 2001 https://jdl.jwfc.jfcom.mil/. [13] C4ISR Architecture Working Group. C4ISR Architecture Framework Vers. 2.0. Washington, D.C.: Department of Defense, 18 Dec. 1997 [14] www.fas.org/irp/program/core/fw.pdf. The next version is the DoD Architecture Framework Vers. 1.0. 15 Aug. 2003 www.aitcnet.org/dodfw