What is a Service Oriented Architecture?

Slides:



Advertisements
Similar presentations
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Advertisements

Computer Networks TCP/IP Protocol Suite.
Chapter 1: The Database Environment
Distributed Systems Architectures
Chapter 7 System Models.
Chapter 24 Quality Management.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Putting the Pieces Together Grace Agnew Slide User Description Rights Holder Authentication Rights Video Object Permission Administration.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
Cultural Heritage in REGional NETworks REGNET T1.4: Development of the system specification.
Jeff Mischkinsky Nickolas Kavantzas Goran Olsson Web Services Choreography.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination. Introduction to the Business.
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
Presented to: By: Date: Federal Aviation Administration Registry/Repository in a SOA Environment SOA Brown Bag #5 SWIM Team March 9, 2011.
1 Preliminary results of the Environmental Data Exchange Network for Inland Waters (EDEN-IW) project Practical lessons. P. Haastrup.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
1 Chapter 12 File Management Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Communicating over the Network
Site Safety Plans PFN ME 35B.
Auto-scaling Axis2 Web Services on Amazon EC2 By Afkham Azeez.
Server Access The REST of the Story David Cleary
Week 2 The Object-Oriented Approach to Requirements
1 Chapter One Introduction to Computer Networks and Data Communications.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S.A.F. 1 Commodity Councils 101 NAME (S) SAF/AQCDATE.
Configuration management
Selecting an Advanced Energy Management System May 2007 Chris Greenwell – Director Energy Markets Scott Muench - Manager Technical Sales © 2007 Tridium,
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 31 Slide 1 Service-centric Software Engineering.
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Chapter 6 Data Design.
1 tRelational/DPS Overview. 2 ADABAS Data Transfer: business needs and issues tRelational & DPS Overview Summary Questions? Demo Agenda.
Legacy Systems Older software systems that remain vital to an organisation.
Copyright 2007, Information Builders. Slide 1 Introduction to Web Services Efrem Litwin Director, WebFOCUS Integration Products Information Builders.
IONA Technologies Position Paper Constraints and Capabilities for Web Services
Sample Service Screenshots Enterprise Cloud Service 11.3.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
Database System Concepts and Architecture
31242/32549 Advanced Internet Programming Advanced Java Programming
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
Executional Architecture
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 15 Programming and Languages: Telling the Computer What to Do.
Chapter 10: The Traditional Approach to Design
Systems Analysis and Design in a Changing World, Fifth Edition
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Chapter 12 Working with Forms Principles of Web Design, 4 th Edition.
Essential Cell Biology
PSSA Preparation.
Essential Cell Biology
Organization Theory and Health Services Management
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 31 Slide 1 Service-centric Software Engineering 1.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 13 Slide 1 Application architectures.
Chapter 14 Designing Distributed and Internet Systems
Energy Generation in Mitochondria and Chlorplasts
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Management Information Systems, 10/e
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
CS 415 N-Tier Application Development By Umair Ashraf July 5,2013 National University of Computer and Emerging Sciences Lecture # 8 Introduction to Service.
Progress SOA Reference Model Explained Mike Ormerod Applied Architect 9/8/2008.
OEI’s Services Portfolio December 13, 2007 Draft / Working Concepts.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
Connecting People With Information Transforming the Way the DoD Manages Data M. David Allen OASD(NII)/DoD CIO May 23, 2006 “The.
Slide 1 Service-centric Software Engineering. Slide 2 Objectives To explain the notion of a reusable service, based on web service standards, that provides.
By Jeremy Burdette & Daniel Gottlieb. It is an architecture It is not a technology May not fit all businesses “Service” doesn’t mean Web Service It is.
Service-centric Software Engineering
CSSSPEC6 SOFTWARE DEVELOPMENT WITH QUALITY ASSURANCE
Presentation transcript:

What is a Service Oriented Architecture? Prof. Paul A. Strassmann George Mason University, November 19, 2007

Problems Addressed by a Service Oriented Architecture

Purpose of Architecture: To Manage Interdependencies

Directions of System Architecture 1960 - 1980 1990 - 2000 Organization Focus Mainframe Centric Internal Use Unique Data Process Focus Client Server Partial Connectivity EDI File Transfer 2010 - 2050 Distributed Functions Data Centric Universal Interoperability Real-time Connectivity

Data Interoperability Expands as Response Time Shrinks

Interoperability Does not Scale

What is a Service Oriented Architecture (SOA)? A method of design, deployment, and management of both applications and the software infrastructure where: All software is organized into business services that are network accessible and executable. Service interfaces are based on public standards for interoperability.

Key Characteristics of SOA Quality of service, security and performance are specified. Software infrastructure is responsible for managing. Services are cataloged and discoverable. Data are cataloged and discoverable. Protocols use only industry standards.

What is a “Service”? A Service is a reusable component. A Service changes business data from one state to another. A Service is the only way how data is accessed. If you can describe a component in WSDL, it is a Service.

Information Technology is Not SOA Business Mission Information Management Information Systems SOA Systems Design Information Technology Computing & Communications

Current Infrastructure Costs are Excessive ($ Millions, I.T. Costs) SOA

Contractors Will Build Separate Infrastructures without SOA

Why Getting SOA Will be Difficult Managing for Projects: Software: 1 - 4 years Hardware: 3 - 5 years; Communications: 1 - 3 years; Project Managers: 2 - 4 years; Reliable funding: 1 - 4 years; User turnover: 30%/year; Security risks: 1 minute or less. Managing for SOA: Data: forever. Infrastructure: 10+ years.

Why Managing Business Systems is Difficult? 40 Million lines of code in Windows XP is unknowable. Testing application (3 Million lines) requires >1015 tests. Probability correct data entry for a supply item is <65%. There are >100 formats that identify a person in DoD. Output / Office Worker: >30 e-messages /day.

How to View Organizing for SOA P r i v a t e A p p l i c a t i o n s a n d F i l e s P E R S O N A L L E V E L P r i v a c y a n d I n d i v i d u a l VARIETY HERE S e c u r i t y B a r r i e r G r a p h i c I n f o W i n d o w , P e r s o n a l T o o l s , I n q u i r y L a n g u a g e s C u s t o m i z e d A p p l i c a t i o n s , P r o t o t y p i n g T o o l s , L o c a l L O C A L L E V E L A p p l i c a t i o n s a n d F i l e s A p p l i c a t i o n s S e c u r i t y B a r r i e r A p p l i c a t i o n s D e v e l o p m e n t & M a i n t e n a n c e A P P L I C A T I O N L E V E L B u s i n e s s S e c u r i t y B a r r i e r Service A Service B OSD B U S I N E S S L E V E L P r o c e s s S e c u r i t y B a r r i e r F u n c t i o n a l P r o c e s s A F u n c t i o n a l P r o c e s s B F u n c t i o n a l P r o c e s s C P R O C E S S L E V E L F u n c t i o n a l P r o c e s s D C o r p o r a t e P o l i c y , C o r p o r a t e S t a n d a r d s , R e f e r e n c e M o d e l s , D a t a M a n a g e m e n t a n d T o o l s , I n t e g r a t e d S y s t e m s C o n f i g u r a t i o n D a t a B a s e , S h a r e d C o m p u t i n g a n d E N T E R P R I S E L E V E L T e l e c o m m u n i c a t i o n s STABILITY HERE I n d u s t r y S t a n d a r d s , C o m m e r c i a l O f f - t h e - S h e l f P r o d u c t s a n d S e r v i c e s G L O B A L L E V E L

SOA Must Reflect Timing Corporate Policy, Corporate Standards, Reference Models, Data Management and Tools, Integrated Systems Configuration Data Base, Shared Computing and Telecommunications, Security and Survivability Business A Business B Infrastructure Support Applications Development & Maintenance ENTERPRISE PROCESS BUSINESS APPLICATION LOCAL Graphic InfoWindow, Personal Tools, Inquiry Languages Customized Applications, Prototyping Tools, Local Applications and Files GLOBAL Industry Standards, Commercial Off-the-Shelf Products and Services PERSONAL Private Applications and Files Functional Process A Functional Process B Functional Process C Functional Process D LONG TERM STABILITY & TECHNOLOGY COMPLEXITY SHORT TERM ADAPTABILITY & SIMPLICITY

SOA Must Reflect Conflicting Interests Personal Local Organizations Missions Enterprise

DoD Concept How to Organize for SOA Programs Army, Navy Air Force Agencies Combatant Commands Business Mission WarFighting Mission Intelligence Mission Enterprise Information Environment Focus of this Presentation

Organization of Infrastructure Services (Enterprise Information) Data Services Security Services Computing Services Communication Services Application Services

Organization of Data Services Discovery Services Management Services Collaboration Services Interoperability Services Semantic Services

Data Interoperability Policies Data are an enterprise resource. Single-point entry of unique data. Enterprise certification of all data definitions. Data stewardship defines data custodians. Zero defects at point of entry. De-conflict data at source, not at higher levels. Data aggregations from sources data, not from reports.

Example of Data Pollution

What Data?

Data Concepts Data Element Definition Text associated with a unique data element within a data dictionary that describes the data element, give it a specific meaning and differentiates it from other data elements. Definition is precise, concise, non-circular, and unambiguous. (ISO/IEC 11179 Metadata Registry specification) Data Element Registry A label kept by a registration authority that describes a unique meaning and representation of data elements, including registration identifiers, definitions, names, value domains, syntax, ontology and metadata attributes. (ISO 11179-1).

Data and Services Deployment Principles Data, services and applications belong to the Enterprise. Information is a strategic asset. Data and applications cannot be coupled to each other. Interfaces must be independent of implementation. Data must be visible outside of the applications. Semantics and syntax is defined by a community of interest. Data must be understandable and trusted.

Organization of Security Services Transfer Services Protection Services Certification Services Systems Assurance Authentication Services

Security Services = Information Assurance Conduct Attack/Event Response Ensure timely detection and appropriate response to attacks. Manage measures required to minimize the network’s vulnerability. Secure Information Exchanges Secure information exchanges that occur on the network with a level of protection that is matched to the risk of compromise. Provide Authorization and Non-Repudiation Services Identify and confirm a user's authorization to access the network.

Organization of Computing Services Facilities Resource Planning Control & Quality Configuration Services Financial Management

Computing Services Provide Adaptable Hosting Environments Global facilities for hosting to the “edge”. Virtual environments for data centers. • Distributed Computing Infrastructure Data storage, and shared spaces for information sharing. • Shared Computing Infrastructure Resources Access shared resources regardless of access device.

Organization of Communication Services Interoperability Services Spectrum Management Connectivity Arrangements Continuity of Services Resource Management

Network Services Implementation From point-to-point communications (push communications) to network-centric processes (pull communications). Data posted to shared space for retrieval. Network controls assure data synchronization and access security.

Network Control is the Key

Communication Services Provide Information Transport Transport information, data and services anywhere. Ensures transport between end-user devices and servers. Expand the infrastructure for on-demand capacity.

Organization of Application Services Component Repository Code Binding Services Maintenance Management Portals Experimental Services

Application Services and Tools • Provide Common End User Interface Tools Application generators, test suites, error identification, application components and standard utilities. Common end-user Interface Tools. E-mail, collaboration tools, information dashboards, Intranet portals, etc.

Example of Development Tools Business Process Execution Language, BPEL, is an executable modeling language. Through XML it enables code generation. Traditional Approach BPEL Approach - Hard-coded decision logic - Externalized decision logic - Developed by IT - Modeled by business analysts - Maintained by IT - Maintained by policy managers - Managed by IT - Managed by IT - Dependent upon custom logs - Automatic logs and process capture - Hard to modify and reuse - Easy to modify and reuse

A Few Key SOA Protocols Universal Description, Discovery, and Integration, UDDI. Defines the publication and discovery of web service implementations. The Web Services Description Language, WSDL, is an XML-based language that defines Web Services. SOAP is the Service Oriented Architecture Protocol. It is a key SOA in which a network node (the client) sends a request to another node (the server). The Lightweight Directory Access Protocol, or LDAP is protocol for querying and modifying directory services. Extract, Transform, and Load, ETL, is a process of moving data from a legacy system and loading it into a SOA application.

SOA Interoperability Goals for the Department of Defense Interoperability of solutions across the DoD strategic goal. Rules for sharing of data and services across the enterprise. Enforcement of standards. All data, services, and applications shall be accessible, understandable, and trusted. Global Information Grid for sharing of information with Federal Departments, Department of Homeland Security, the Intelligence Community, state and local governments, allied, coalition, non-governmental organizations (NGOs), academic, research and business partners.

Example of Customizable Web Services (www.salesforce.com)

Why SOA Saves Code Provides a standard way of interacting with shared software. Enables software to become building blocks for reuse. Shifts focus to application assembly rather than design. Creates new applications out of existing components. Integrates with applications in other enterprises.

Preservation of Assets is the Purpose of SOA Data & Systems Integration; Communications Infrastructure Architecture Open Systems, Equipment, Software, Communications What the Customer Trains to Apply; Applications Usage Short-term Asset (An Enterprise Function) >70% of Cost Obsolescent Commodity Asset (Outsource According to Architecture) <20% of Cost Long - term Asset (An Enterprise Function) <10% of Cost

Impacts of Information Technologies Information drives economic “arms race”. Obsolete assets will be discarded. Collaboration favors global consolidation. I.T. becomes an economic weapon.

A Historical Perspective