• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Tim Cooke
  • Liutauras Vilda
  • Jeanne Boyarsky
  • paul wheaton
Sheriffs:
  • Ron McLeod
  • Devaka Cooray
  • Henry Wong
Saloon Keepers:
  • Tim Holloway
  • Stephan van Hulst
  • Carey Brown
  • Tim Moores
  • Mikalai Zaikin
Bartenders:
  • Frits Walraven

part 2

 
Greenhorn
Posts: 4
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi All,

If the external system from which we need to interact for a particular functionality is a black box for us then our implementation will be an assumption based?

like

My imgaginative scenario:
Suppose a music online store demands some money from customers to listen to music online.
for it the store has a aggrement with bank like ABN Ambro to help them with fund transfer,
the music lover will first tranfer fund from their personal bank account (suppose HSBC bank)
to this music store account with the help of this ABN Ambro bank.

My confusion is that

For this kind to money tranfer is unbuilt EJB transactions are enough as far as security
goes

also

As ABN Ambro implementation is a black box what my system will do to interact with this black box interface for transfer
I mean I should use a WEb service or JMS with acknowldegment (as music store will wait from abn ambro bank confirmation before allowing music to listen).
or just implement simple EJB stuff or POJOS.

I am confused

Thanks,
 
Ranch Hand
Posts: 40
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Kirti,

Are you saying that the interface details of the external system in your assignment is not specified?

Regards,
Vijay
 
Kriti Goel
Greenhorn
Posts: 4
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Yes its not mentioned how I should interact with that system.
 
Vijay keshava
Ranch Hand
Posts: 40
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
If it is a external system (explicitly mentioned in the assignment) then there should be some hints about the system and probably they want you to identify the best approach to interact. For example if it is hinted that the external system is not in the company's n/w (where the SUD will be deployed) then there are certain technologies that may not be suitable and you should not be using them...

If you are positive that you are not given any hints regarding how the interface can be accessed/what format the data would be supplied etc, then in my opinion it should be fine to make an appropriate assumptions, with appropriate justification (keeping in mind the given non-functional requirements and the architectural principles) and proceed. Ensure that you are not over-engineering.

This is just my take...not sure if it helps...but the whole point of the exam is that you, as an architect should be able to take appropriate decisions and justify the same.
 
Kriti Goel
Greenhorn
Posts: 4
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Thanks Vijay,

I was also thinking to put it in assumption as there are two external system in my assignment, for one they have clearly mentioned the techology interface and for other its not there.

I m thinking to generate a XML format from my system for this 2nd external system do that whatsoever be the system in whichever technology it can handle it.

My second concern is Security like the music online store example i have given above...if transfer of fund happen between music lover and external bank and externak bank is external system than how to take care of security in the interaction. As it is cleary mentioned in assignment that overall it should be atleast 128 bit minimum encryption.

 
Montana has cold dark nights. Perfect for the heat from incandescent light. Tiny ad:
Gift giving made easy with the permaculture playing cards
https://coderanch.com/t/777758/Gift-giving-easy-permaculture-playing
reply
    Bookmark Topic Watch Topic
  • New Topic