Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 16 Next »

Important design decisions

Overall Description

The coordination layer offers communication through a message broker and a data transmission via https. This is illustrated in the below figure. In general communication is initiated and actions are coordinated via the message broker, while the actual transmission of data is done via data transmission.

There are no intelligence in the Coordination Layer and it is the clients that are responsible for choices that involves intelligence e.g. in chooing an alternative pillar for request of data (according to Service Level Agreement).

Message Broker

It is assumed that

  • the underlying low level protocol for message transmission is specified as part of the message broker, and thus this will not be a addressed directly in this architecture
  • the message broker software is persistent

Communication

Asynchronous communication

All communication is asynchronous, unless it is explicitly specified to be synchronous. This enables return of answers of transactions to be in arbitrary order.

Start communication via Topic

All communication via the Coordination layer starts via a Topic that is send to all. It is up to the individual subscribers to determine whether it is a message that concerns them, for example a Get message does only concern the pillars involved in a certain service level agreement.

Atomic operations

Operation must be as atomic and simple as possible. this serves to give simplicity, and to get as little overlap between different operations as possible.

Using Get as example

The Get operation can begin by asking pillars who will be the fastes, or it can start by actually sending a get message for a specific default pillar.

In the strict interpretation of single operations this will be seen as two operations

  1. GetTime
  2. Get

An the difference between the two get scenarios will be that teh first will both consist of a GetTime and a Get opertation, while the later will only consist of a Get.

The below figure illustrates the messages of the two operations illustrated, where messages belonging to the same communication in an operation is placed edge to edge. note that it only includes messages on the message bus, i.e. excluding the actual data transmission.

Since each communication is started via a topic this means that the GetTime and the Get is sent to a Topic. This is illustrated in the below sequence diagram

<TBD> See http://wiki.statsbiblioteket.dk/BitmagasinWiki/Sekvens1

The advantages are:

  • the Get operation works similar for the two scenarios
  • it will be easy to handle shift in services, e.g. exchanging one primary pillar with another, exchaging pillars in a SLA etc.

The disadvantages can be:

  • there may be a heavy load of messages that all substribers must go through in order to find the ones interesting for themselves.

Software

Independence

In the design we need to ensure that we as independent of the software chosen as possible. If special features are used, e.g. for optimisation, then the design must be flexible enough to skip use of the special features at a later stage.

Data Transmission

It is assumed that

  • it is sufficient to identify a data transmission transaction by a token
  • the token is sufficient information as basis for completion of a data transmission

Use of tokens

Tokens are used to til designation of where the data can be put to or downloaded from.

Issuing of token are alsways done by client in client/pillar communications. Creation of the actual connection is done by the pillar.

Paging

Paging is in the first versions manage by a simple mecanism where a segment of a file is identified by parameters. Any Get command can contain an offset along with a length parameter, which defines the segment of the file. this is also sufficient to handle receival of divided files, and thus enabling rudimentary support of restart of an interrupted transmission.

Certifications

Encryption rules and credentials must be specified in special unit in organisation. This is partly treated in configuration of SLA data.

  • No labels