Architecture

This page introduces the WOSH system by an high-level perspective.

This is one of the first documents you should probably read.

Table of Contents:

"The structure of the components of a program/system, their interrelationships, and principles and guidelines governing their design and evolution over time" [Garlan 95]


Overview

WOSH is a system of systems. We may define it as an (application-level) operative system by many points of view.

Some technical definitions of WOSH are:

Some notes about WOSH:


WOSH Core Architecture

As said in other parts of the documentation, any WOSH application is based on micro-kernel, while real services (which provide features to the users) are designed as (pluggable) services (and called Bundles).

WOSH.Architecture.System.png

WOSH System Architecture

Since WOSH Core library is fully multi-platform and included in every Application, its requirements are few and it is designed to be very scalable.

wosh::WoshKernel and Core-Modules are singletons and may be accessed (direct reference) as static objects.

WOSH.Architecture.WoshKernel.png

WOSH Core Architecture

See also:
Core
wosh::WoshKernel

WOSH Bundle Architecture

WOSH.Architecture.Bundle.1.png

WOSH Bundle Architecture

See also:
Bundles
wosh::Bundle

WOSH Security

Security is a very hot topic in a multi-user, multi-network system like WOSH.

Users (such as inhabitants) may access to WOSH features in many ways (channels), even through third-party networks (such as IM, mail, voice), because of that a flexible authentication system must be integrated into the system.

Since the system is based on Messages, the authentication approach is based on SecurityToken and signing (objects and messages), receiver evaluates those credentials against current ACL (Access Control List). Components such as wosh::PropertiesProvider provide custom ACL for each element.

Consider a single standalone WOSH Host.

Warning:
WOSH Distributed Security is still under planning, actually the network trusts authentication by any node (many hackings are possible).
WOSH.Architecture.Security.png

WOSH Security Architecture

See also:
Security
wosh::security

WOSH RMI (Remote Method Invocation)

See also:
wosh::rmi::IStub, wosh::rmi::ISkeleton, wosh::rmi::IEvent
wosh::rmi::StubFactory
wosh::rmi

WOSH Automations

WOSH.Architecture.Automations.png

WOSH Automations Architecture

See also:
wosh::automations::Automation
wosh::automations

WOSH Building

WOSH.Architecture.Building.png

WOSH Building Architecture

See also:
wosh::building::BuildingBlock
wosh::building

WOSH Scripting

WOSH.Architecture.Scripting.png

WOSH Scripting Architecture

See also:
wosh::scripting::Script
wosh::scripting


Generated on Sat Feb 26 2011 11:28:28 for WOSH system 0.8.888 [phoenix] by Alessandro Polo, using DoxyGen 1.7.2 hosted by WOSH Framework