Udostępnij za pośrednictwem


Agile Architecture Method

AgileArchitecture

I presented our new patterns & practices Agile Architecture Method for the first time at the patterns & practices Summit.   Our Agile Architecture Method is an iterative and incremental approach for designing architectures. 

To summarize, it’s a technique that:

  • Scopes and focuses your architecture exercise.
  • Uses scenarios to drive the design and evaluate potential solutions.
  • Helps you think through your choice of application type, deployment, architectural style and technologies.
  • Helps you quickly iterate through potential solutions.
  • Helps you map potential patterns.

I’ve summarized the approach below, and we’ve posted a step-step how to on CodePlex:

Input
Here’s the key input into the process:

  • Use cases and usage scenarios
  • Functional requirements
  • Non-functional requirements (quality attributes such as performance, security, and reliability)
  • Technological requirements
  • Target deployment environment
  • Constraints

Output
Here’s the key output of the process:

  • Architecturally significant use cases
  • Architecture hot spots
  • Candidate architectures
  • Architectural spikes

Summary of Steps

  • Step 1. Identify Architecture Objectives.
  • Step 2. Identify Key Scenarios.
  • Step 3. Create an Application Overview.
  • Step 4. Analyze Key Hot Spots.
  • Step 5. Create Candidate Solutions.

Step 1. Identify Architecture Objectives
This is a scoping exercise.  The purpose of this step is to figure out how much time and energy to spend on subsequent steps as well as guide your overall effort.   You should know what you want in terms of outcomes.  Here’s an example of potential goals:

  • Build a prototype
  • Identify key technical risks
  • Test potential paths
  • Share models and understanding

Step 2. Identify Key Scenarios
Identify relevant scenarios to focus your design on what matters most, and to evaluate your candidate solutions.    In this case, you want to identify architecturally significant use cases.  Architecturally significant use cases are those that meet the following criteria:

  1. They are important for the success and acceptance of the deployed application.
  2. They exercise enough of the design to be useful in evaluating the architecture.

You can draw key scenarios from your user stories, business stories and system stories.

Step 3. Create an Application Overview
Create an application overview.  The application overview serves to make your architecture more real, connecting it to real-world constraints and decisions. 

WhiteboardingYourDesign

An application overview consists of the following steps:

  • Determine your application type. First, determine what type of application you are building. Is it a mobile application, a rich client, a rich internet application, a service, a Web application, or some combination?
  • Understand your deployment constraints. Next, understand your targeted deployment environment and determine what impact this will have on your architecture.
  • Identify important architectural styles. Determine which architectural styles you will be using in your design. Will you build a service oriented architecture, client/server, layered, a message bus, or some combination?
  • Determine relevant technologies. Finally, identify the relevant technology choices based on your application type, architectural styles and deployment constraints.

A good test of an application overview is whether you can whiteboard it.

Step 4. Analyze Key Hot Spots
Identify key hotspots based on quality attributes and the architecture frame. These are the areas where mistakes are most often made when designing an application.

Quality Attributes Frame
Understand the quality attributes that are important for your application and scenarios. For instance, most applications need to address security and performance and will be traded against usability, flexibility and other attributes that may be more or less important to you depending on your scenarios and requirements.  You can use the following frame to identify key quality attributes to consider:

Category Considerations
Availability How to design for failover support How to design a redundant site How to plan for backup and recovery How to design for runtime upgrades
Conceptual Integrity How to isolate from external dependencies How to create a migration path from legacy technologies How evolve the system without breaking clients
Flexibility How to handle dynamic business rules How to handle dynamic UI How to handle changes in data and logic processing How to handle changes in business requirements
Interoperability How to allow applications to interoperate while still evolving separately How to isolate systems through the use of service interfaces How to isolate systems through the use of mapping layers
Maintainability How to reduce dependencies between layers and components How to implement a pluggable architecture How to choose an appropriate communication model
Manageability How to understand the key types of failure How to monitor system operation and health How to modify system behavior based on load
Performance How to determine a caching strategy How to design high performance communication between layers How to design high performance data access How to manage resources effectively
Reliability How to handle unreliable external systems How to audit requests and jobs How to redirect load How to handle failed communication How to handle failed transactions How to handle exceptions
Reusability How to reduce duplication between components and layers How to share functionality across systems How to share functionality across components and layers
Scalability How to design layers and tiers for scalability How to scale-up or scale-out How to handle spikes in traffic and load
Security How to address authentication and authorization. How to protect against malicious input. How to protect sensitive data
Supportability How to design auditing and logging How to design usable error messages
Testability How to design for testability How to design unit tests How to design for UI automation
Usability How to design for user empowerment How to improve responsiveness How to avoid common user experience pitfalls

Architecture Frame
The architecture frame represents cross cutting concerns that will impact your design across layers and tiers. These are also the areas in which high impact design mistakes are most often made. Use the architecture frame to identify hot spots in your design that require additional attention to get right.  You can use the following architecture frame to identify cross cutting concerns in your design:

Category Considerations
Authentication and Authorization How to choose an authentication strategy. How to choose an authorization strategy. How to flow identity across layers and tiers. How to store user identities when not using Active Directory.
Caching and State How to choose an appropriate caching technology. How to determine what data to cache. How to determine where to cache the data. How to determine the expiration policy.
Communication How to choose appropriate protocols for communication across layers and tiers. How to design loose coupling across layers. How to perform asynchronous communication. How to pass sensitive data.
Composition How to choose a composition pattern for the user interface (UI). How to avoid dependencies between modules in the UI. How to handle communication between modules in the UI.
Concurrency and Transactions How to handle concurrency between threads. How to choose between optimistic and pessimistic concurrency. How to handle distributed transactions. How to handle long running transactions.
Configuration Management How to determine what information needs to be configurable. How to determine where and how to store configuration information. How to protect sensitive configuration information. How to handle configuration information in a farm/cluster.
Coupling and Cohesion How to choose an appropriate layering strategy for separation of concerns. How to design highly cohesive components and group them within layers. How to determine when loose coupling is appropriate between components within a layer.
Data Access How to manage database connections. How to handle exceptions. How to improve performance. How to handle binary large objects (blobs).
Exception Management How to handle exceptions. How to log exceptions. How to provide notification when required.
Logging and Instrumentation How to determine which information to log. How to make the logging configurable. How to determine what level of instrumentation is required.
User Experience How to improve task efficiency and effectiveness. How to improve responsiveness. How to improve user empowerment. How to improve look and feel. </>
Validation How to determine where and how to perform validation. How to validate for length, range, format, and type. How to constrain and reject input. How to sanitize output.
Workflow How to choose the appropriate workflow technology. How to handle concurrency issues within a workflow. How to handle task failure within a workflow. How to orchestrate processes within a workflow.

Step 5. Create Candidate Solutions
Create a candidate architecture and along with architectural spikes and evaluate it against your key scenarios, hot spots, and deployment constraints.  The outcomes of this step are:

  • Baseline / Candidate Architectures
  • Architectural Spikes

Iterative and Incremental Design
You can iteratively flesh out your architecture as you work through your design and discover more details that impact your architecture.  You don’t have to design your architecture in a single iteration. Do not get lost in the details; focus on the big steps and build a framework on which you can base your architecture and design.

My Related Posts

New Release: patterns & practices App Arch Guide 2.0 Beta 1

patterns & practices App Arch Guide 2.0 Project

App Arch Guide 2.0 Overview Slides

Abstract for Application Architecture Guide 2.0

App Arch Meta-Frame

App Types

Architecture Frame

App Arch Guidelines

Layers and Components

Key Software Trends

Cheat Sheet: patterns & practices Catalog at a Glance Posted to CodePlex

Cheat Sheet: patterns & practices Pattern Catalog Posted to CodePlex

Comments

  • Anonymous
    November 05, 2008
    PingBack from http://www.tmao.info/agile-architecture-method/

  • Anonymous
    November 05, 2008
    Its interesting that I at first I would have put Application Overview at first in fact that is probably what I always do. However it may make more sense to do the way you do. And by the way the Quality Attributes and Architecture Frame are great references!

  • Anonymous
    November 07, 2008
    @Georgely - Thanks!  I know what you mean.  Originally we had the app overview first -- it's nearly interchangeable, but the idea is to really focus on the architecturally significant use cases.  They're a great scoping mechanism.

  • Anonymous
    November 08, 2008
    Definitely agreed that this way scoping among the use cases seems much more efficient. Not to mention that whenever starting to design a system architecture even before the use cases one usually has at least a minimal understanding of the application and already constructs a rough model of how it should be working - even if not put down on paper in this initial phase yet.

  • Anonymous
    November 11, 2008
    Application Architecture Guidance Communiqué: Issue 1 About the Application Architecture Guidance 2.0

  • Anonymous
    November 14, 2008
    As part of our patterns &amp; practices Application Architecture 2.0 project , we created a set of application

  • Anonymous
    November 20, 2008
    The comment has been removed

  • Anonymous
    November 20, 2008
    The comment has been removed

  • Anonymous
    November 20, 2008
    The comment has been removed

  • Anonymous
    November 24, 2008
    We’ve had multiple customers ask our app arch guide 2.0 team for smaller, more focused guides.&#160;

  • Anonymous
    November 26, 2008
    Many customers requested app arch guide 2.0 team of Microsoft for smaller, more focused guides. As a

  • Anonymous
    June 22, 2016
    wooow...i term this as a simplified scoping mechanisms..i like it