From the course: Software Architecture Foundations
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Identifying bounded contexts and entities
From the course: Software Architecture Foundations
Identifying bounded contexts and entities
- The next step in my process is to start identifying the agents in the system. Depending on the architectural pattern you'll decide on, I'll talk about several of those in chapter five, these agents become classes or subsystems, or maybe microservices. At the same time, you'll start figuring out how the agents talk to each other and what the dependency relationships are. I do all of that using a process that's commonplace in the DDD world called event storming. The best way to explain it is to demonstrate it. The first step is to decide on the events. These are all domain-level events that are meaningful to the business. The activity diagram from the last movie can help us with that. The first event I can think of is, the comment has been submitted. I'll write that out on a sticky note and put it on the wall. The next one is, the comment has been added to the dashboard. That one goes up on the wall, too. Other events are, the email has been sent, the reply was received, the moderator…