Architectural Viewpoints (Overiew)

Architectural viewpoints provide a way of viewing and understanding the complex system from different perspectives. Each viewpoint is oriented towards specific concerns of different stakeholders. The DP system can be seen from various viewpoints, which we detail in this chapter.
Functional Viewpoint
The Functional Viewpoint focuses on the system's functionality and its interaction with its users and external systems. It identifies the key functions of the DP system like creating, updating, and executing scripts, managing access control, and ensuring the reliable operation of DPs. This viewpoint is of particular concern to the DP Creator, DP Operator, and DP Users.
Information Viewpoint
The Information Viewpoint concerns the system's data management aspect. It covers how the DP system stores, retrieves, updates, and deletes data, and manages data privacy and security. The DP Owner and End Users are particularly interested in this viewpoint.
Concurrency Viewpoint
The Concurrency Viewpoint is concerned with how the system handles multiple operations happening simultaneously. It identifies the system's strategies for managing concurrency and ensuring data integrity and consistency. The DP Operator and System Administrators are mainly interested in this viewpoint.
Development Viewpoint
This Development Viewpoint is particularly relevant to System Architects and Developers. It focuses on how the DP system is structured into components, the responsibilities of each component, and their interactions. It also covers aspects like software layers, development technologies, and architectural styles used.
Deployment Viewpoint
The Deployment Viewpoint concerns the operational aspects of the DP system. It covers the system's hardware and software requirements, deployment strategies, and scalability considerations. System Administrators and DP Operators are the key stakeholders for this viewpoint.
Security Viewpoint
The Security Viewpoint is concerned with the measures the DP system takes to protect data and services from threats. It identifies the system's strategies for authentication, authorization, data encryption, audit, and incident response. The DP Owner, End Users, and Regulatory Bodies are primarily interested in this viewpoint.
Governance and Compliance Viewpoint
The Governance and Compliance Viewpoint is mainly of interest to Consortium Members and Regulatory Bodies. It looks at how the DP system complies with regulations and governance frameworks, as well as how it supports objectives like tracking CO2 footprints.