Home > Symbol Legend

Symbol Legend

Actively Processing

Actively Processing

Attacker

Attacker

Business Process/Workflow Logic

Business Process/
Workflow Logic

CPU

CPU

Cloud

Cloud

Component or Program

Component or Program

Conflict Symbol

Conflict Symbol

Connection Ports or Virtual Switch

Connection Ports or
Virtual Switch

Core Switch

Core Switch

Decoupled Service Contract

Decoupled Service Contract

Firewall

Firewall

General Machine Processable Document

General Machine
Processable Document

General Physical Boundary

General Physical Boundary

Grid Service

Grid Service

Hard Disk

Hard Disk

Hard Disk with Enclosure

Hard Disk with Enclosure

Heartbeat Message

Heartbeat Message

Human

Human

Human Readable Document

Human Readable Document

Hypervisor

Hypervisor

Internet

Internet

LUN Migration

LUN Migration

LUNs

LUNs

Live Storage Migration

Live Storage Migration

Live VM Migration

Live VM Migration

Logical Network Perimeter/Logical Boundary

Logical Network Perimeter/
Logical Boundary

Malicious Component or Program

Malicious Component
or Program

Malicious Service Agent

Malicious Service Agent

Management System

Management System

Memory

Memory

Message

Message

Message Queue

Message Queue

Mobile Computer

Mobile Computer

Mobile Devices

Mobile Devices

Multitenant Application

Multitenant Application

Network Adapter

Network Adapter

Organization

Organization

Pattern

Pattern

Pattern Currently Being Covered

Pattern Currently
Being Covered

Physical Network Device

Physical Network Device

Physical Server

Physical Server

Policy

Policy

Private Key

Private Key

Product, System or Application

Product, System
or Application

Public Key

Public Key

Ready-made Environment

Ready-made Environment

Remote Administration System

Remote Administration System

Repository or Storage Device

Repository or
Storage Device

Repository with State Data

Repository with State Data

Resource Cluster

Resource Cluster

Resource Pool

Resource Pool

Revised Pattern

Revised Pattern

Router

Router

Schema or Data Model

Schema or Data Model

Security Element or Locked Resource

Security Element or
Locked Resource

Service

Service

Service Agent

Service Agent

Service Composition

Service Composition

Service Contract (Chorded Circle Notation)

Service Contract
(Chorded Circle Notation)

Service Inventory

Service Inventory

Service Layer

Service Layer

Service with State Data (Stateful Service)

Service with State Data
(Stateful Service)

Services

Services

Shared Storage

Shared Storage

State Data in Memory

State Data in Memory

Storage Controller

Storage Controller

Storage Device (Internal)

Storage Device (Internal)

Storage Replication

Storage Replication

Symbols Used in Conceptual Relationship Diagrams

Symbols Used in
Conceptual Relationship Diagrams

System or Program Boundary

System or Program Boundary

Top-of-rack Switch

Top-of-rack Switch

Transition Arrow

Transition Arrow

Trusted Attacker

Trusted Attacker

User Interface/Portal

User Interface/Portal

VI Manager

VI Manager

Virtual Desktop

Virtual Desktop

Virtual Firewall

Virtual Firewall

Virtual Network Device

Virtual Network Device

Virtual Private Network

Virtual Private Network

Virtual Server

Virtual Server

Virtualization Platform

Virtualization Platform

Workstation

Workstation

Zone or Region

Zone or Region