صفحه 1:
What is a Service Oriented
Architecture?
Prof. Paul A. Strassmann
George Mason University, November 19, 2007
صفحه 2:
۱۷۵۵/۸۵
sense out of this.
How do! do that?
صفحه 3:
Purpose of Architecture: To Manage
Interdependencies
Suppliers Logistics nancial Outsourcing
Dealers Pa ۳ it énance
Customer inane 2۳۳ 0
صفحه 4:
Directions of System Architecture
2050 - 2010 2000 - 1990 1980 - 1960
مهف
۰0۰ 6۰0
۰0-۰0 6-0
یلا۰0 ۱ س<) م۰0
“Dara Orci سم ما۰ ۱
قات صصص *Portd Orewertviyy *Ooversd اما
“E01 Pte Tremere *Rechicee Orueniviy ) سجو(*
4
صفحه 5:
Interoperability - Number of Data Sources
a
Data Interoperability Expands as Response Time
4,000 Billion
1 Billion
40 Milion
100,000
4,000
400
2025
Data
2015
2005
1995
1975
1955
Shrinks
10 Mion
۳
3
2
3 soon
an
oO
E100
2
8
ع
8 1,000
2
1
4
1004
صفحه 6:
Interoperability Does not Scale
56 3 Interoperability:
Generation ...یروط Missions for National nymper of Data
Security Systems pn
1 4958-1975 | Automate Separate 100
Applications
2 1975-1995 | Automate Separate 1,000
Processes
۲ Integrate Processes
3 1995 - 2005 عا مو حا لد 100,000
Integrate Functions 531
4 2005 - 5 within an Organization 10 Million
Innovate Processes 5
5 2015 - 0 Ke Neadad 1 Billion
صفحه 7:
What is a Service Oriented Architecture (SOA)?
¢ Amethod of design, deployment, and
management of both applications and the
software infrastructure where:
- All software is organized into business
services that are network accessible and
executable.
- Service interfaces are based on public
standards for interoperability.
صفحه 8:
Key Characteristics of SOA
* Quality of service, security and performance
are specified.
¢ Software infrastructure is responsible for
managing.
* Services are cataloged and discoverable.
* Data are cataloged and discoverable.
¢ Protocols use only industry standards.
صفحه 9:
What is a “Service”?
A Service is a reusable component.
A Service changes business data from one state
to another.
A Service is the only way how data is accessed.
If you can describe a component in WSDL, it is a
Service.
صفحه 10:
10
Information Technology is Not SOA
Information Management
Information Systems
Systems Design |
را
اتسنیا
00
ینت
Computing & Communications
صفحه 11:
Current Infrastructure Costs are Excessive (¢
Millions, 1.T. Costs)
Pol OF 96 Pond
nee سر مین
90% 800,02 صمصدت (1) جد(
Sak dog 9 ی ۱ 5551
9۹6 96,9۶ سرا
996 50,696 صصص (1) 7)ناا”
990 90090 م1 6 م۳
Ofer 5066© 09
Dordt OAD PY OP $90 qe 222 0
11
صفحه 12:
Contractors Will Build Separate Infrastructures
۳۷0
$30.7
$24.1
78.5%
12
FY06
$29.9
$22.6
75.6%
FY05
$28.7
$21.1
73.5%
without SOA
$ Billions
Overall DOD IT Spend
Contracted DoD IT Spend
% Contracted
صفحه 13:
13
Why Getting SOA Will be Difficult
* Managing for Projects:
- Software: 1 - 4 years
Hardware: 3 - 5 years;
- Communications: 1 - 3 years;
- Project Managers: 2 - 4 years;
- Reliable funding: 1 - 4 years;
- User turnover: 30%/year;
- Security risks: 1 minute or less.
* Managing for SOA:
- Data: forever.
- Infrastructure: 10+ years.
صفحه 14:
Why Managing Business Systems is Difficult?
40 Million lines of code in Windows XP is
unknowable.
Testing application (3 Million lines) requires
>10% tests.
Probability correct data entry for a supply item
is <65%.
There are >100 formats that identify a person
in DoD.
Output / Office Worker: >30 e-messages /day.
14
صفحه 15:
+—OPR1ETY TERE
Looe vac
تما ۲۵۵مصرمهه]
eoenass Lane,
ناته سس
TERE 0ب
Jeroen, Lava
How to View Organizing for SOA
Davate Oeelestere sel Mew
ما وت Tools لس Grapkte Pe tedous
سا بات و باس مساق لوگ
ال سب
1
وس ا 000
Cone ® مد © 000
"Review Gore ®
Crwettved Gove ®
ددا دكا اع 0
عت ع
و
‘Date Ovwegrorel wed Tovkn loteerated Qeterow
Opdinrtire ate Gaw, Cherrd Orwpulton aed
“Avlevrerowivalivae
Aedintry Qader de, Oowraerctal OF tor ho
اک ام سس
Grey od
س0
Conwy Berto
0000000
هيوست
Once
owt Barter
Coon Barter
صفحه 16:
سس عد ممم
SLORT 0 یج
036۳/۳6/۷۷
hECTMOOLOGY
peevemoo fe IDPLIOVDY
۳۳۹۹۵۵۰ BLOM MERD
BTBBWITY &
hEOCWMOOLOCY
SOMPLEXITY
16
SOA Must Reflect Timing
رمعي ,ملسا لسسع سلما له
Cryin Ton ord لها
Spear Poe
سه 6 سا0 سبي
صفحه 17:
17
SOA Must Reflect Conflicting Interests
Missions
صفحه 18:
DoD Concept How to Organize for SOA
Programs
ا له ل ل ل
ie 0 Agencies لك
Air Force ommand
Business MissionWarFighting Missi@telligence Mission
“ocus of this, t
resentation
لها
18
صفحه 19:
Application
Services
19
Organization of Infrastructure Services
communication
Services
Computing
Services
Security
Services
Data
Services
صفحه 20:
Organization of Data Services
Data
Services
[ | |
Discovery a) ‘ollaboration Imteroperabilit} Semantic
Services Services Services Services Services
20
صفحه 21:
Data Interoperability Policies
Data are an enterprise resource.
Single-point entry of unique data.
Enterprise certification of all data definitions.
Data stewardship defines data custodians.
Zero defects at point of entry.
De-conflict data at source, not at higher levels.
Data aggregations from sources data, not from
reports.
21
صفحه 22:
22
Frequency
9,451
228
158
128
88
20
5
2
1
3:
323
Example of Data Pollution
Citizen?
US
Yes
USA
U.S.A.
U.S.
United States
(US)
Green Card
Naturalized
Applied
22?
صفحه 23:
23
XML
LegalXML
IFX
cXML
ebXML
HL7 V3.0
ACORD (AL3,
(>
۳۳۷/۶۵2۵
SEMI-
STRUCTURED
XML
HL7
HIPAA
ASTM
EDL-XI2
ممع لمع
FIX
Cargo IMP.
MYR
AFP
Post Script
DJDE
What Data?
UNSTRUCTURED
Microsoft Word
Microsoft Excel
PowerPoint
PDF
Star Office
Word Perfect
ASCII reports
HT™L
۴۵0
Undocumented
Flat files
RPG
ANSI
صفحه 24:
Data Concepts
* Data Element Definition
- Text associated with a unique data element within a data
dictionary that describes the data element, give it a
specific meaning and differentiates it from other data
elements. Definition is precise, concise, non-circular, and
unambiguous. (ISO/IEC 11179 Metadata Registry specification)
* Data Element Registry
- A label kept by a registration authority that describes a
unique meaning and representation of data elements,
including registration identifiers, definitions, names,
value domains, syntax, ontology and metadata
attributes. (iso 11179-1)
24
صفحه 25:
Data and Services Deployment Principles
Data, services and applications belong to the
Enterprise.
Information is a strategic asset.
Data and applications cannot be coupled to each
other.
Interfaces must be independent of implementation.
Data must be visible outside of the applications.
Semantics and syntax is defined by a community of
interest.
Data must be understandable and trusted.
صفحه 26:
۱
uthenticatio
Services
26
۱
Organization of Security Services
Systems
Assurance
Security
Services
Services
eel
Protection
Services
[
Transfer
Services
صفحه 27:
Security Services = Information Assurance
* Conduct Attack/Event Response
* Ensure timely detection and appropriate response to attacks.
* Manage measures required to minimize the network's
vulnerability.
* Secure Information Exchanges
* Secure information exchanges that occur on the network
with a level of protection that is matched to the risk of
compromise.
* Provide Authorization and Non-Repudiation
Services
* Identify and confirm a user's authorization to access the
network.
27
صفحه 28:
Financial
janagementj
28
Organization of Computing Services
Configuration
Services
Computing
Services
Control &
Quality
Resource
Planning
[
Computing
Facilities
صفحه 29:
29
Computing Services
* Provide Adaptable Hosting Environments
- Global facilities for hosting to the “edge”.
- Virtual environments for data centers.
¢ Distributed Computing Infrastructure
- Data storage, and shared spaces for
information sharing.
* Shared Computing Infrastructure Resources
- Access shared resources regardless of
access device.
صفحه 30:
Organization of Communication Services
30
صفحه 31:
Network Services Implementation
* From point-to-point communications (push
communications) to network-centric processes
(pull communications).
۰ Data posted to shared space for retrieval.
* Network controls assure data synchronization
and access security.
31
صفحه 32:
Network Control is the Key
صفحه 33:
Communication Services
¢ Provide Information Transport
- Transport information, data and services
anywhere.
- Ensures transport between end-user devices
and servers.
- Expand the infrastructure for on-demand
capacity.
33
صفحه 34:
Organization of Application Services
Application
Services
ددا سس | پیت
34
صفحه 35:
Application Services and Tools
* Provide Common End User Interface Tools
- Application generators, test suites, error
identification, application components and
standard utilities.
* Common end-user Interface Tools.
- E-mail, collaboration tools, information
dashboards, Intranet portals, etc.
صفحه 36:
Example of Development Tools
* Business Process Execution Language, BPEL, is an
executable modeling language. Through XML it enables
code generation.
Traditional Approach ___ BPEL Approach
- Hard-coded decision logic - Externalized decision logic
- Developed by IT - Modeled by business analysts
- Maintained by IT - Maintained by policy managers
- Managed by IT - Managed by IT
- Dependent upon custom logs _- Automatic logs and process
capture
- Hard to modify and reuse - Easy to modify and reuse
36
صفحه 37:
A Few Key SOA Protocols
* Universal Description, Discovery, and Integration, UDDI.
Defines the publication and discovery of web service
implementations.
* The Web Services Description Language, WSDL, is an XML-
based language that defines Web Services.
* SOAP is the Service Oriented Architecture Protocol. It is a
key SOA in which a network node (the client) sends a
request to another node (the server).
* The Lightweight Directory Access Protocol, or LDAP is
protocol for querying and modifying directory services.
* Extract, Transform, and Load, ETL, is a process of moving
data from a legacy system and loading it into a SOA
application.
37
صفحه 38:
SOA Interoperability Goals for the Department of
Defense
Interoperability of solutions across the DoD strategic goal.
Rules for sharing of data and services across the
enterprise.
Enforcement of standards.
All data, services, and applications shall be accessible,
understandable, and trusted.
Global Information Grid for sharing of information with
Federal Departments, Department of Homeland Security,
the Intelligence Community, state and local governments,
allied, coalition, non-governmental organizations (NGOs),
academic, research and business partners.
38
صفحه 39:
Example of Customizable Web Services
Funmua_calacfarce cam)
ها دی مها هم (opexchange:
Cheon =
Serle 9 ممممسي تمفسة
لصم 15[| > totam ter
> am ouctes 0) feature Bemests,
۲ هتسه ۱
یه ها ms 6
So pas مه ها
مسق sex
سوه شوت زو
3 یه cama tre noe
مسح سه م estar Links
+ Loninse dase User
* Louings eT usar
0
سک
صفحه 40:
Why SOA Saves Code
Provides a standard way of interacting with
shared software.
Enables software to become building blocks for
reuse.
Shifts focus to application assembly rather than
design.
Creates new applications out of existing
components.
Integrates with applications in other enterprises.
40
صفحه 41:
Preservation of Assets is the Purpose of SOA
Data &
hat the Customer ystems Integration
Trains to Apply; 4) Communications
Infrastructure
Architecture
Applications
Usage
Lowry - tere اساسا بسحا
Ovexnmdy Dover Ovvet سوه
(Oa Coterprise Pucetzra) — (Oveower Pooch (Bu Baterprise (Pucrtira)
:و00 خاو 00090> >PO% oP Oost Crass)
<OO% vo Cost
41
صفحه 42:
42
Impacts of Information Technologies
Information drives economic “arms race”.
Obsolete assets will be discarded.
Collaboration favors global consolidation.
I.T. becomes an economic weapon.
صفحه 43:
A Historical Perspective
$1,000,0@0 2
2 سوه م21 سس و
3 00,۵
3
1 5000 Bo Power م0 ذم امم د
=
2 Saar
5
۳ $a Bo Power = ban Ouxershy
£ 50
3
z
3 $d] Bo Power = Perry Omrped
8
ع
0
160۵:۵۵6۵ 6/۵۵۵ ۵۵ doo ao
اس - Years
43