صفحه 1:
What is a Service Oriented Architecture? Prof. Paul A. Strassmann George Mason University, November 19, 2007

صفحه 2:
۱۷۵۵/۸۵ sense out of this. How do! do that?

صفحه 3:
Purpose of Architecture: To Manage Interdependencies Suppliers Logistics nancial Outsourcing Dealers Pa ۳ it énance Customer inane 2۳۳ 0

صفحه 4:
Directions of System Architecture 2050 - 2010 2000 - 1990 1980 - 1960 مهف ۰0۰ 6۰0 ۰0-۰0 6-0 یلا۰0 ۱ س<) م۰0 ‎“Dara Orci‏ سم ما۰ ۱ قات صصص ‎*Portd Orewertviyy *Ooversd‏ اما ‎“E01 Pte Tremere *Rechicee Orueniviy‏ ) سجو(* ‎4 ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎

صفحه 5:
Interoperability - Number of Data Sources a Data Interoperability Expands as Response Time 4,000 Billion 1 Billion 40 Milion 100,000 4,000 400 2025 Data 2015 2005 1995 1975 1955 Shrinks 10 Mion ۳ 3 2 3 soon an oO E100 2 8 ‏ع‎ ‎8 1,000 2 1 4 1004

صفحه 6:
Interoperability Does not Scale 56 3 Interoperability: Generation ‏...یروط‎ Missions for National nymper of Data Security Systems pn 1 4958-1975 | Automate Separate 100 Applications 2 1975-1995 | Automate Separate 1,000 Processes ۲ Integrate Processes 3 1995 - 2005 ‏عا مو حا لد‎ 100,000 Integrate Functions 531 4 2005 - 5 within an Organization 10 Million Innovate Processes 5 5 2015 - 0 Ke Neadad 1 Billion

صفحه 7:
What is a Service Oriented Architecture (SOA)? ¢ Amethod of design, deployment, and management of both applications and the software infrastructure where: - All software is organized into business services that are network accessible and executable. - Service interfaces are based on public standards for interoperability.

صفحه 8:
Key Characteristics of SOA * Quality of service, security and performance are specified. ¢ Software infrastructure is responsible for managing. * Services are cataloged and discoverable. * Data are cataloged and discoverable. ¢ Protocols use only industry standards.

صفحه 9:
What is a “Service”? A Service is a reusable component. A Service changes business data from one state to another. A Service is the only way how data is accessed. If you can describe a component in WSDL, it is a Service.

صفحه 10:
10 Information Technology is Not SOA Information Management Information Systems Systems Design | را اتسنیا 00 ینت Computing & Communications

صفحه 11:
Current Infrastructure Costs are Excessive (¢ Millions, 1.T. Costs) Pol OF 96 Pond nee ‏سر مین‎ 90% 800,02 صمصدت (1) جد( ‎Sak dog 9‏ ی ۱ 5551 9۹6 96,9۶ سرا 996 50,696 صصص (1) 7)ناا” 990 90090 م1 6 م۳ ‎Ofer 5066© 09 Dordt OAD PY OP $90 qe 222 0 ‎ ‎11 ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎

صفحه 12:
Contractors Will Build Separate Infrastructures ۳۷0 $30.7 $24.1 78.5% 12 FY06 $29.9 $22.6 75.6% FY05 $28.7 $21.1 73.5% without SOA $ Billions Overall DOD IT Spend Contracted DoD IT Spend % Contracted

صفحه 13:
13 Why Getting SOA Will be Difficult * Managing for Projects: - Software: 1 - 4 years Hardware: 3 - 5 years; - Communications: 1 - 3 years; - Project Managers: 2 - 4 years; - Reliable funding: 1 - 4 years; - User turnover: 30%/year; - Security risks: 1 minute or less. * Managing for SOA: - Data: forever. - Infrastructure: 10+ years.

صفحه 14:
Why Managing Business Systems is Difficult? 40 Million lines of code in Windows XP is unknowable. Testing application (3 Million lines) requires >10% tests. Probability correct data entry for a supply item is <65%. There are >100 formats that identify a person in DoD. Output / Office Worker: >30 e-messages /day. 14

صفحه 15:
+—OPR1ETY TERE Looe vac تما ۲۵۵مصرمهه] eoenass Lane, ناته سس ‎TERE‏ 0ب Jeroen, Lava How to View Organizing for SOA Davate Oeelestere sel Mew ما وت ‎Tools‏ لس ‎Grapkte Pe tedous‏ سا بات و باس مساق لوگ ال سب 1 وس ا 000 Cone ® ‏مد‎ © 000 "Review Gore ® Crwettved Gove ® ‏ددا دكا اع‎ 0 ‏عت ع‎ ‏و‎ ‎‘Date Ovwegrorel wed Tovkn loteerated Qeterow Opdinrtire ate Gaw, Cherrd Orwpulton aed “Avlevrerowivalivae Aedintry Qader de, Oowraerctal OF tor ho ‏اک ام سس‎ Grey od ‏س0‎ ‎Conwy Berto 0000000 هيوست Once owt Barter Coon Barter

صفحه 16:
سس عد ممم ‎SLORT 0‏ یج 036۳/۳6/۷۷ ‎hECTMOOLOGY‏ ‎peevemoo fe IDPLIOVDY ‎۳۳۹۹۵۵۰ BLOM MERD BTBBWITY & hEOCWMOOLOCY SOMPLEXITY ‎ ‎16 ‎SOA Must Reflect Timing ‏رمعي ,ملسا لسسع سلما له ‎Cryin Ton ord‏ لها ‎Spear Poe‏ ‏سه 6 سا0 سبي ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎

صفحه 17:
17 SOA Must Reflect Conflicting Interests Missions

صفحه 18:
DoD Concept How to Organize for SOA Programs ا له ل ل ل ie 0 Agencies ‏لك‎ Air Force ommand Business MissionWarFighting Missi@telligence Mission “ocus of this, t resentation لها 18

صفحه 19:
Application Services 19 Organization of Infrastructure Services communication Services Computing Services Security Services Data Services

صفحه 20:
Organization of Data Services Data Services [ | | Discovery a) ‘ollaboration Imteroperabilit} Semantic Services Services Services Services Services 20

صفحه 21:
Data Interoperability Policies Data are an enterprise resource. Single-point entry of unique data. Enterprise certification of all data definitions. Data stewardship defines data custodians. Zero defects at point of entry. De-conflict data at source, not at higher levels. Data aggregations from sources data, not from reports. 21

صفحه 22:
22 Frequency 9,451 228 158 128 88 20 5 2 1 3: 323 Example of Data Pollution Citizen? US Yes USA U.S.A. U.S. United States (US) Green Card Naturalized Applied 22?

صفحه 23:
23 XML LegalXML IFX cXML ebXML HL7 V3.0 ACORD (AL3, (> ۳۳۷/۶۵2۵ SEMI- STRUCTURED XML HL7 HIPAA ASTM EDL-XI2 ‏ممع لمع‎ FIX Cargo IMP. MYR AFP Post Script DJDE What Data? UNSTRUCTURED Microsoft Word Microsoft Excel PowerPoint PDF Star Office Word Perfect ASCII reports HT™L ۴۵0 Undocumented Flat files RPG ANSI

صفحه 24:
Data Concepts * Data Element Definition - Text associated with a unique data element within a data dictionary that describes the data element, give it a specific meaning and differentiates it from other data elements. Definition is precise, concise, non-circular, and unambiguous. (ISO/IEC 11179 Metadata Registry specification) * Data Element Registry - A label kept by a registration authority that describes a unique meaning and representation of data elements, including registration identifiers, definitions, names, value domains, syntax, ontology and metadata attributes. (iso 11179-1) 24

صفحه 25:
Data and Services Deployment Principles Data, services and applications belong to the Enterprise. Information is a strategic asset. Data and applications cannot be coupled to each other. Interfaces must be independent of implementation. Data must be visible outside of the applications. Semantics and syntax is defined by a community of interest. Data must be understandable and trusted.

صفحه 26:
۱ uthenticatio Services 26 ۱ Organization of Security Services Systems Assurance Security Services Services eel Protection Services [ Transfer Services

صفحه 27:
Security Services = Information Assurance * Conduct Attack/Event Response * Ensure timely detection and appropriate response to attacks. * Manage measures required to minimize the network's vulnerability. * Secure Information Exchanges * Secure information exchanges that occur on the network with a level of protection that is matched to the risk of compromise. * Provide Authorization and Non-Repudiation Services * Identify and confirm a user's authorization to access the network. 27

صفحه 28:
Financial janagementj 28 Organization of Computing Services Configuration Services Computing Services Control & Quality Resource Planning [ Computing Facilities

صفحه 29:
29 Computing Services * Provide Adaptable Hosting Environments - Global facilities for hosting to the “edge”. - Virtual environments for data centers. ¢ Distributed Computing Infrastructure - Data storage, and shared spaces for information sharing. * Shared Computing Infrastructure Resources - Access shared resources regardless of access device.

صفحه 30:
Organization of Communication Services 30

صفحه 31:
Network Services Implementation * From point-to-point communications (push communications) to network-centric processes (pull communications). ۰ Data posted to shared space for retrieval. * Network controls assure data synchronization and access security. 31

صفحه 32:
Network Control is the Key

صفحه 33:
Communication Services ¢ Provide Information Transport - Transport information, data and services anywhere. - Ensures transport between end-user devices and servers. - Expand the infrastructure for on-demand capacity. 33

صفحه 34:
Organization of Application Services Application Services ددا سس | پیت 34

صفحه 35:
Application Services and Tools * Provide Common End User Interface Tools - Application generators, test suites, error identification, application components and standard utilities. * Common end-user Interface Tools. - E-mail, collaboration tools, information dashboards, Intranet portals, etc.

صفحه 36:
Example of Development Tools * Business Process Execution Language, BPEL, is an executable modeling language. Through XML it enables code generation. Traditional Approach ___ BPEL Approach - Hard-coded decision logic - Externalized decision logic - Developed by IT - Modeled by business analysts - Maintained by IT - Maintained by policy managers - Managed by IT - Managed by IT - Dependent upon custom logs _- Automatic logs and process capture - Hard to modify and reuse - Easy to modify and reuse 36

صفحه 37:
A Few Key SOA Protocols * Universal Description, Discovery, and Integration, UDDI. Defines the publication and discovery of web service implementations. * The Web Services Description Language, WSDL, is an XML- based language that defines Web Services. * SOAP is the Service Oriented Architecture Protocol. It is a key SOA in which a network node (the client) sends a request to another node (the server). * The Lightweight Directory Access Protocol, or LDAP is protocol for querying and modifying directory services. * Extract, Transform, and Load, ETL, is a process of moving data from a legacy system and loading it into a SOA application. 37

صفحه 38:
SOA Interoperability Goals for the Department of Defense Interoperability of solutions across the DoD strategic goal. Rules for sharing of data and services across the enterprise. Enforcement of standards. All data, services, and applications shall be accessible, understandable, and trusted. Global Information Grid for sharing of information with Federal Departments, Department of Homeland Security, the Intelligence Community, state and local governments, allied, coalition, non-governmental organizations (NGOs), academic, research and business partners. 38

صفحه 39:
Example of Customizable Web Services Funmua_calacfarce cam) ‏ها دی مها هم‎ (opexchange: Cheon = Serle 9 ‏ممممسي تمفسة‎ ‏لصم‎ 15[| > totam ter > am ouctes 0) feature Bemests, ۲ ‏هتسه‎ ۱ ‏یه ها‎ ms 6 So pas ‏مه ها‎ ‏مسق‎ sex سوه شوت زو 3 ‏یه‎ cama tre noe مسح سه م ‎estar Links‏ + Loninse dase User * Louings eT usar 0 سک

صفحه 40:
Why SOA Saves Code Provides a standard way of interacting with shared software. Enables software to become building blocks for reuse. Shifts focus to application assembly rather than design. Creates new applications out of existing components. Integrates with applications in other enterprises. 40

صفحه 41:
Preservation of Assets is the Purpose of SOA Data & hat the Customer ystems Integration Trains to Apply; 4) Communications Infrastructure Architecture Applications Usage ‎Lowry - tere‏ اساسا بسحا ‎Ovexnmdy Dover Ovvet‏ سوه ‎(Oa Coterprise Pucetzra) — (Oveower Pooch (Bu Baterprise (Pucrtira)‏ :و00 خاو 00090> ‎>PO% oP Oost Crass)‏ ‎<OO% vo Cost ‎41

صفحه 42:
42 Impacts of Information Technologies Information drives economic “arms race”. Obsolete assets will be discarded. Collaboration favors global consolidation. I.T. becomes an economic weapon.

صفحه 43:
A Historical Perspective $1,000,0@0 2 2 ‏سوه م21 سس و‎ 3 00,۵ 3 1 5000 Bo Power ‏م0 ذم امم د‎ = 2 Saar 5 ۳ $a Bo Power = ban Ouxershy £ 50 3 z 3 $d] Bo Power = Perry Omrped 8 ‏ع‎ 0 160۵:۵۵6۵ 6/۵۵۵ ۵۵ doo ao ‏اس‎ - Years 43

جهت مطالعه ادامه متن، فایل را دریافت نمایید.
34,000 تومان