Saturday, March 7, 2020

Explain what is meant by the term “Enterprise Architecture”. What are some considerations when defining the architecture?


Any modelling endeavor requires the minimum requirements of methodologies to be employed. With the various options available we continue to operate at the enterprise at the level of granularity, that is view the architecture at a very abstract level. As shown in the picture in page 233 of the text book. The picture finds to the factor the concepts which was presented previously into parts that suggests systems and process. There have been a differences in trust levels and exposure with the help of separating the internal and external from each other and even distinguish the differences between from cloud services and the internet.
Most of the users of cloud services are likely to be accessed via the internet but some of the cloud services will generally be run by units that have had their security investigated and approved. The whole purpose of doing this is to oppose to traffic originating from uninvestigated entities on the internet. The public internet is commonly perceived and treated as hostile entity until the authority or further information is not circulated. There will be some suspicion but these cloud services have to be trusted sufficiently such that they support business functions and their normalities. Though internet does not have such a trust and for this reason the two abstract areas are viewed as separate clouds, separate assurance levels.
As we all can notice that the aggregated “presentation” function has now two components. The first one is internal presentations and the other one is external presentations. Every individual presentation is represented as a series of separate presentation layer components comprising a larger abstraction. The component architecture articulates the vital of the conceptual view by stating that presentation services are separate functions from the underlying applications. To keep a cleaner representation separate application rectangles connected to separate presentation layers have not been drawn.
This level of application requires trying to separate out each application and its specific presentation would introduce many of the detail and the requirement is hopefully unnecessary to understand what components embrace the architecture. As a replacement for, the architect and, definitely, the security architect can accept some mapping that makes intellect between these two components.
Obviously, at hand we have multiples of each type of application. When revising definite application instances that are individual parts of this component architecture, the very aspect of precisely what links to what will be required. To this level the system architect is very much interested in gross alignments of functions which are to be properly understood in any case when an application is deployed to this frame, every aspects is understand the application components that must get diagrammed in detail. Furthermore, there is to have a convey to application designer to manage the how the application is to be factored so that the particulars of the expected components.
Integration and mechanism are other integral part of the distinct systems. Any system which provides identity services or storage should be internal and also should supports an external copy that can be toughened against exposure. In the same time, the customer supporting and business ratifying applications must be available externally. System architect provides a guide for how to separate the business function that made up any particular system that becomes a part or expresses the enterprise architecture.

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home