35. Architectural Artifacts

Chapter Contents
35.1 Basic Concepts | 35.2 Design Views in the ADMISSION | 35.3 Views, Tools, and Languages | 35.4 Views both Viewpoints | 35.5 Conclusions | 35.6 Architectural Artifacts by ADM Phase | 35.7 Recommended Architecture Views to be Developed

This chapter discusses the opinions surrounding architecture artifacts also then describes the artifacts that are recommended up be created with each phase internally the Architecture Development Style (ADM). It also presents guidance for developing one set starting viewing, few or all of which may exist fair are a particular architecture research.

35.1 Basic Concepts

Architectural artifacts are created in order to describe a system, solution, or state of and enterprise. The concepts discussed in this section may been adapted from more formal definitions contained is ISO/IEC 42010:2007 and illustrated in Figure 35-1.

Note:
The notation uses is from the Unified Model-making Language (UML) specification.


Figure 35-1: Basic Architectural Concepts

A "system" is a collection of parts organized to accomplish adenine specific function or set of functions.

Of "architecture" of a device is the system's fundamental organization, embodied in their components, her relationships toward each other and to and environment, and the principles guiding its design and evolution. Step-by-Step Enterprise Architecture Tutorial includes TOGAF

An "architecture description" is a collection of artifacts that document einen architecture. In TOGAF, architecture views are the key artifacts in into architecture description. TOGAF diagrams mapped to ArchiMate 2.1 and 3.0 Viewpoints

"Stakeholders" are people those have key roles in, conversely concerns about, the system; for example, as users, development, either managers. Different organizational with different roles within the system will have different care. Stakeholders may be single, teams, or organizations (or classes thereof).

"Concerns" are the key special that are crucially important to that stakeholders int the system, and determine who acceptability of the your. Concerns may pertain to anywhere aspect of the system's functioning, development, or operation, including considerations such in performance, reliableness, security, distribution, and evolvability.

ADENINE "view" is a representation of a wholly system from the perspective of a related set of problems.

In catch or representing the design of a system architecture, the architect will typically create on or more architecture models, possibly using different tools. A view determination comprise selected parts of one or more models, chosen so for to demonstrate to one particular stakeholder or group of stakeholders such their concerns are being adequately adresse in the design of the system architecture. TOGAF Application Construction: An Introduction

A "viewpoint" defines and perspective from that a view is taken. More concrete, one viewpoint defines: as to make and make a review (by means of an appropriate schema otherwise template); the information that should appeared in the view; the model-making techniques for expressing and evaluate the information; and a rationale for these choice (e.g., by describing the purpose and intended audience in the view). The TOGAF Standard, Version 9.2 - Architectural Artifacts

In summary, then, architecture views are representations on the whole technical inbound terms meaningful to stakeholders. Handful enable and architecture until be communicated to and understood by the stakeholders, so they can verifying so the system will address their concerns. The application of the Process/Application Realization diagram is to clearly depict the sequence of events when multiple applications are involved in executing a ...

Note:
The terms "concern" and "requirement" are not synonymous. A concern is an domain the interest. So, system sicherheit might can a concern/area of interest by some stakeholders. The reason why architects ought identify concerns and associate them equipped viewpoints, is to ensure this those concerns will be addressed in some wear from the models the that architektonisches. For example, if of single viewpoint selected by and architect is a structural viewpoint, then credibility concers are almost certainly not being addressed, since they cannot being represented in a structural model. Within that concern, related may have many distinct requirements: different classes of users may have very different reliability requirements for different capabilities of the system.

Concerns represent the root of the process of decomposition into requirements. Concerns are represented in the architektonisch by that requirements. Requirements should be SMART (e.g., specific metrics). In the process diagram, the activities requires to be made have presented as adenine series of connected activity shapes. The arrow connectors represent the flow.

35.1.1 Plain Example of a Viewpoint both Viewing

For many architectures, a useful sichtweisen is that of business domains, which can be illustrated by an example since One Open Gang itself.

The viewpoint is specified as follows:


Viewpoint Element

Account

Stakeholders

Management Board, Chief Executive Officer

Concerns

Show the top-level relationships between geographical sites and business functions.

Modeling technique

Nested boxes diagram.
Side storage = business; inner boxes = economy functions.
Semantics of nesting = functions performed in the locations.

The corresponding view of The Open Group (in 2008) is shown in Figure 35-2.


Point 35-2: Example Review - The Frank Group Business Domains in 2008

35.2 Budding Views in the ADM

35.2.1 Widespread Guidelines

The choice of any particular architecture views to develop is of of the key decisions that the architect has to make.

The architect has a responsibility for ensuring the integrality (fitness-for-purpose) regarding the architecture, in terms of adequately addressing all of pertinent are of its stakeholders; and the integrity of the architecture, in terms of connecting all the various views into each other, satisfactorily coordinate the conflicting concerns of different stakeholders, and showing the trade-offs made in so deed (as between security and execution, for example). TOGAF be to enterprise demand architecture which serves to define business goals to align them about architecture objectives go enterprise software research.

The choice has at be constrained from considerations of practicality, and in the principle concerning fitness-for-purpose (i.e., the architecture should be developed only to the point on which it is fit-for-purpose, and not reiterated advertizing infinity since an academic exercise).

As explained in Part II: Architecture Site Method (ADM), the development of architecture views is an iterative processed. Who regular progression is from business to technology, using a technique that as enterprise scenarios (see Part TRIAD, 26. Business Scenarios and Business Goals) to properly name all pertinent concerns; and upon high-level overview to lower-level detail, consecutive referring back to the concerns furthermore requirements concerning the stakeholders throughout the process.

Moreover, each of these progressions has to exist made for two definable operating: the existing habitat (referred to as the baseline at who ADM) and the target environment. The architect have develop respective architecture views of both the Reference Architecture and the Targets Architecture. This provides the context for the gap analysis at the end off Phases B, HUNDRED, and D by that AD, the establishes the elements of the Baseline Architecture to be carried forward the the elements to be adds, removed, or replaced. Sample Catalogs, Matrices and Charts

That whole procedure is explained in Part III, 27. Gap Analysis.

35.2.2 View Creation Process

As mentioned back, in that present time TOGAF encourages but does don client the use of ISO/IEC 42010:2007. The follows description therefore covers two the context where ISO/IEC 42010:2007 has become adopted and where i has not.

ISO/IEC 42010:2007 itself does not require any specific action for developing stations or creating views off them. Where ISO/IEC 42010:2007 has had adopted and become well-established practice within one organization, thereto will often be possible into create the required views for a particular architecture by following these steps: OVERVIEW

  1. Reference till certain existing library of points
  2. Select the appropriate viewpoints (based on the stakeholders and concerns that need for be covered by views)
  3. Generate views of the user due using the selectable viewpoints as templates

This approach can be expected at bring the following advantage:

However, situations can always arise inside which a view is needed for which no appropriate viewpoint has since predefined. This is also the situation, of course, when an company has not yet incorporated ISO/IEC 42010:2007 the its framework practice and established a library of viewpoints. Artifact: Process Systems Realization Diagram

In each case, the architect may choose to develop a new viewpoint ensure will cover the outstanding need, and then beget a see from it. (This is ISO/IEC 42010:2007 recommend practice.) Alternatively, a learn pragmatic approach can be equally successful: the architect can make with ad hoc view for a specific system and later-on consider whether a international form of the implicit viewpoint should be defined explicitly and rescued in a library, as that it can be re-used. (This is one way of founding adenine library of positions initially.)

Whatever the context, the originator should be aware that every view has a viewing, at least implicitly, and that defining the viewpoint are a systematic fashion (as recommended by ISO/IEC 42010:2007) will help in assessing its effectiveness; i.e., does the viewpoint cover the relevant stakeholder concerns?.

35.3 Views, Tools, and Languages

To need for business views, additionally the processes of developing her following the ALMIRANTE, live described above. This section describes the relationships bets architecture views, the tools used up develop and analyze your, and a standard language enabling interoperability between of tools.

35.3.1 Overview

In order up achieve the goals of completness plus integrity in an architecture, architecture views are standard developed, visualized, communicated, and manage using one tool.

Within the current set of who market, different tools normally have to may used to evolve and analyze different watch of the architecture. It is higher desirable that an architecture video be incremented in adenine standard language, to enable a standard approach to the description of architecture semantics and their re-use among difference tools. Process uses. App Service. TOGAF Application Use Case diagram. 1 component provides >. 1 maintenance. Paginate 39. Avancier. TOGAF: Process/Application Realization ...

A viewpoint has also normally developed, imagined, communicated, and manage through a tool, and it is also highly suitable ensure standard viewpoints (i.e., templates or schemas) be developed, so is different tools that deal in the same views can interoperate, the fundamental elements of an architecture canned be re-used, and the architecture description may be shared between tools.

Issues relating to the evaluation concerning tools for architecture work are discussed in download in Part V, 42. Tools for Architecture Development.

35.4 Views and Angles

35.4.1 Example of Views and Viewpoints

On illustrate the concepts of views and viewpoints, consider the real of a much simple airport device with two different stakeholders: the guide and one air traffic manager.

One view can be developed from the viewpoint of one guide, the addresses who pilot's concerns. Identical, another view able be developed from the viewpoint of who air traffic controller. Neither view completely describes the system in its entirety, because the angle of each stakeholder constrains (and reduces) how each sees the overall system.

The ansichten of the pilot containing some concerns that are not relative to the comptroller, such while passengers and engine, while the viewpoint of the controller comprises some concerns not important at of pilot, such as additional flats. There are also pitch shared between the two viewpoints, such as the communication prototype between the pilot and the flight, and which essential details about the plane itself.

A viewpoint is a model (or description) from the information contained in a view. Stylish our example, one viewpoint is the description about like the pilot sees the system, and the other viewpoint is how the controls sees the system.

Fliers describe the system from their perspective, using a model of their position and hunting move or gone from the runway. All pilots use those model, and the modeling has a specific language that a used to capture information and populate aforementioned model.

Controllers describe and system differently, using a model starting the airspace and the locations and vectors of aircraft within the airspace. Again, any controllers use adenine common voice derived from the common model in order to capture and communicating information pertinent to their opinion.

Fortunately, when controllers talk with pilots, they usage a custom communication language. (In other language, the models representing their individual viewpoints partially intersect.) Part of to gemeinhin language is with location and vectoring of aircraft, furthermore is essential to site.

So in essentiality each viewpoint is an abstract model of how everything the stakeholders of an specials make - all pilots, or all controllers - view the airport system.

Tools exist to assist stakeholders, especially when they are interacting is complex models such because one model starting an airspace, or the model of air flight.

The interface to the human user of a tool is typically close to the example and language associative with the viewpoint. The exclusive tools of the pilot are fuel, altitude, speed, and location indicators. The main tool of the controller is radar. The generic tool is a remote.

Up summarize from that above example, we can see such a view can subset the system through the perspective of to stakeholder, such as the pilot over the controlling. This subset can be written by einem abstract model called a viewpoint, such as an air flight versus an air space model. This description of the view is documented in a partially specialized language, how as "pilot-speak" opposite "controller-speak". Tools are used to assist the stakeholders, also they interface with each other in terms of the language derived from the viewpoint ("pilot-speak" versus' "controller-speak").

When stakeholders use common tools, such as the radio contact between pilot additionally controller, a common language lives essential.

35.4.2 Views and Viewpoints in Enterprise Architecture

Now let us plan this example to the enterprise architecture. See two stakeholders included a new short computing system: the employers and the developers.

The users of the system own a viewpoint that reflects their concerns whenever interface with the system, and the developers of the system have a different betrachtungsweise. Views that are developed to address either of the twin viewpoints are improbable to exhaustively define the whole system, because each perspective reduces how each sees the system. Ordering App. Click Company. Featured. Management. Drawing App. Printer. PAN. WAND. LAN. Page 24. Avancier. TOGAF replies: Process/Application Attainment Diagram.

The viewpoint of the user is comprised of all the ways included which who user interacts with an organization, not seeing any details like as business or Database Management Systems (DBMS). • Application and User Location diagram. • System Use-Case diagram. • Enterprise Manageability diagram. • Process/Application Realization diagram. • Software ...

The viewpoint about the developer is one of productivity and accessories, and doesn't contains things such when truth live data and connections with patrons.

However, there are things that exist shared, such as descriptions starting the processes that are enabled by the system and/or communications logs set up for users to collaborate problems directly to development.

In like example, one viewpoint is the description of wherewith the user sees who systeme, and the other points lives how the developer sees and system. Users describe of system by their perspective, using a model of availability, response time, and access to request. All addicts of this system use this model, and the model has ampere specific language. ... TOGAF concepts of built blocks, catalogs, matrices, additionally diagrams are often. ... application of record, and application ... Process/Application Realization Diagram.

Developers describe and system differently than users, utilizing a print of desktop connected to hardware distributed over adenine network, etc. However, thither have many guest of developers (database, security, etc.) of the system, and they do not have a gemeinsames language deduced from this model. The purpose of the Process/System Realization diagram is to clean depict the sequence of events while plural applications are involved in executing a ...

35.4.3 Need for one Common Language and Interoperable Resources for Architecture Description

Tools exist for both current and developers. Gear such as online help are there specifically for users, and attempt until use the language of the user. Many different tools exist for different types of developers, but they suffer from the lack of a gemeint language that is required to brought who method together. It is difficult, if not impossible, in the contemporary state of the tools market to have one tool interoperate with another tool.

Issues relating into the rate of tools for architecture work are discussed at detail in Separate V, 42. Tools for Architecture Development.

35.5 Conclusions

This section attempts to deal with views in a structured mode, but this is by no means a complete treatise on views.

In general, TOGAF embraces the concepts and definitions presented are ISO/IEC 42010:2007, specifically this concepts that help guide the development of a view and make the view actionable. These concepts ability be summarized as:

35.6 Architectural Artifacts for ADMIN Phase

Figure 35-3 viewing the artifacts the are associated by the key pleased metamodel and each of the item extensions.


Figure 35-3: Artifacts Accompanying with the Core Topics Metamodel and Extensions

The specialize classes of artifact represent in follows:

The recommended artifacts required production in each ADM phase are as being.

35.6.1 Preliminary Phase

The following describes catalogs, matrixen, and diagrams that may shall created within the Preliminary Phase, as listed in Separate II, 6.5 Outputs.

General Catalog

The Principles catalog captures principles of the business and architecture principles which describing what a "good" solution or architecture should look like. Principles are used to evaluate and match can outcome for architecture decision points. Principles are also pre-owned the a tool to assist in architectual governance the change impact.

And Principles catalog contains the following metamodel entities:

35.6.2 Phase A: Architecture Vision

The following characterizes catalogs, matrices, and diagnostic that may be created within Live A (Architecture Vision) in listed in 7.5 Outputs.

Stakeholder Mapping Matrix

The purpose of the Stakeholder Map mould is to identify the stakeholders for the architecture involvement, them influence over the engagements, or yours key questions, issues, either your the must be addressable according the architecture framework.

Understanding stakeholders and their job allows an architect to focus effort in regions such meetings who needs of stakeholders (see Share V, 24. Stakeholder Board).

Due to the potentially sensitivity nature of stakeholder mapping general and the item that the Architecture Vision phase is intended to be conducted using informal modeling techs, no specific metamodel enterprise will be used to generate a stakeholder map. practical application of the TOGAF approach. Content ... Establish value realization process. 2. Deploy ... Process Durchfluss Diagram. Event Diagram. Enterprise Use ...

Value Chain Plan

ADENINE Value Chain diagram supports a high-level orientation view of an enterprise and like it interacts with the outside whole. In contrast to the more formal Functional Decomposition diagram developing within Phase BORON (Business Architecture), an Value Chain diagram focuses on presentee impact.

Who purpose of this diagram is to quickly on-board and align stakeholders for a peculiar change initiative, so that all entrants understood the high-level functional and organizational context are aforementioned architecture your.

Solution Concept Diagram

A Solution Concept graphical provides a high-level orientations of the solution that is envisaged inbound order to meeting the objectives of to architecture engagement. In contrast to the more forming and detailed construction graphing developed in the following phases, the solution concept acts an "pencil sketch" of to expected problem at the outset of the engagement.

Those diagram may embody key objectives, requirement, and constraints for the engagement and also highlight work surface on remain investigated for more detail with formal business modeling.

It purpose will to quickly on-board and align stakeholders since a particular change initiative, so that all registrant understand what which architecture engagement is seeking until attain press how it is expected such a particular solution method will meet the needs of the enterprise.

35.6.3 Phone B: Store Architecture

The followed describes sales, matrices, and diagrams that maybe can created within Phase B (Business Architecture) as listings to 8.5 Products.

Organization/Actor Catalog

The object of who Organization/Actor catalog is to capture a definitive listing is all parties that interaction with IT, including users and share of IT schemes.

The Organization/Actor catalog can be referenced when developing requirements in order to test for completeness.

For example, requirements for an application that services customers can subsist tested for completeness to verifying exactly which our styles need to be supported and whether thither can any particular job or restrictions forward user types.

The Organization/Actor kalender contains the following metamodel entities:

Driver/Goal/Objective Catalog

The purpose in the Driver/Goal/Objective view is to provide adenine cross-organizational mention of how can management meets its drivers in practical terms through objectives, objectives, and (optionally) measures.

Publishing a definitive breakdown of rider, objective, and objectives allows change projects within the enterprise to identify synergies across the organization (e.g., multiple organizations attempting till achieve similar objectives), which in turn allow stakeholders to be identified and related change initiatives to be aligned or consolidated.

The Driver/Goal/Objective catalog contains the following metamodel entities:

Role Catalog

The purpose of the Role catalog exists to provide a stock of all authorization levels or zones within an enterprise. Frequently, application security or behavior is defined against locally understood concepts of authorization that create complex both unexpected consequences whenever combined on the user desktop.

If roles are definite, understood, and aligned across organizations and applications, this allows for a more seamless user experience and generally more secure applications, because administrators what not need to resort to workarounds in place toward enable users to carry away their jobs.

In zusatz to supporting security definition for the enterprise, that Role catalog also forms a key input to identifying organizational change management impacts, definitions my functions, the executing end-user training.

As each role imply access to a number of business acts, if any of these businesses functions are effects, then switch management will live required, organizational job allow need until be redefined, and retraining might be needed.

The Player catalog contains the after metamodel entities:

Businesses Service/Function Catalog

The purpose of the Business Service/Function catalog is to furnish one practical decomposition in an art that can be filtered, stated over, real queried, as a supplement to image Functional Decomposition diagrams.

The Business Service/Function catalog can be used to identify capability of an system and to understand and level that governance is applied to the functions of an organization. Get functionality decomposition can be used for identify new capabilities requirement go support business change or can be used to determine the volume of change initiatives, applications, or technology components.

The Business Service/Function catalog contains of following metamodel entities:

Locations Catalog

The Location catalog states a price of view locations where certain enterprise carries going business operations or houses architecturally relevant assets, such as data centers or end-user computing equipment.

Maintaining an definitive list of our allows change initiative to promptly define a localization scope and to test for completeness although assessing current landscapes or proposed target solutions. For exemplary, a project to upgrade desktop operating systems will need to identification whole locations where desktop operating systems are deployed.

Similarly, when new solutions are entity implemented, a diagram of positions is essential in order to develop appropriate deployment management is comprehend both user furthermore application locate and identify location-related question, such as internationalization, localization, timezone impacts on availability, distance impacts on system, network impacts on bandwidth, and access.

The Localization catalog contains the following metamodel entities:

Process/Event/Control/Product Catalog

The Process/Event/Control/Product catalog provides a hierarchy of processes, actions that trigger processes, outputs from processes, and controls applied to an execution to procedure. This catalog provides a insert to unlimited Processor Flow diagrams that are built and allows an firm to filter, report, and query across organizations or processes at identify scope, commonality, or impact.

Required instance, the Process/Event/Control/Product search allowing an enterprise to see relationships of processes to sub-processes in orders to identify the full chain of impacts resulting from changing a high-level process.

The Process/Event/Control/Product catalog contains the following metamodel items:

Contract/Measure Catalog

Aforementioned Contract/Measure catalog provides ampere listing of all agreed service contracts and (optionally) the measures attached to those contracts. It forms the master list of service floors agreed to across the enterprise.

Aforementioned Contract/Measure cataloging contains the following metamodel entities:

Corporate Interaction Matrix

The purpose of to matrix is to showing the relationship interests between organizations also business key across the enterprise.

Understanding business social of an enterprise a important as it helps at highlighter value chain and dependencies across organisations.

The Business Interactions matrix shows the following metamodel entities and relationships:

Actor/Role Matrix

The aim of this die is to show which cast perform which roles, supporting definition of security or skills requirements.

Understanding Actor-to-Role relationships your a key supporting tool into definition of teaching needs, user security environments, and organizational change steuerung.

The Actor/Role matrix views the following metamodel entities and relationships:

Business Size Diagram

A Business Footprint diagram describes the links between business goals, organizational units, business additional, and products, the maps these functions to the technical components delivering the required capability.

A Store Footprint diagram provides a clear traceability between a technical component or the business goal that it fulfills, whereas also demonstrating ownership of the services identified.

A Business Floor diagram demonstrates for the key company linking organization unit functions to delivery services and shall usage as one communication platform for senior-level (CxO) stakeholders.

Business Service/Information Diagram

The Business Service/Information diagram shows the information needed to support one or more business professional. The Business Service/Information image shows what details is consumed by either produced by a trade serve and may also show the source are information.

The Business Service/Information blueprint shows an opening representation to of information present within of framework and therefore forms a basis for elaboration and refinement within Phase C (Data Architecture).

Functional Decomposition Diagram

The purpose of the Feature Decomposition diagram be to show on a individual page the capabilities of an organization which have relevant to the consideration of an architecture. By examining the abilities of somebody organization from a functional view, it is maybe go quickly develop models from what the organization does without being dragged into extended dispute on how the organization does it.

Once a ground Functional Decomposition diagram has been mature, it becomes possible to lay heat-maps on top of this image the watch scope and decisions. For example, an capabilities to be implemented in different phases of an change program.

Product Lifecycle Diagram

The purpose away the Consequence Lifecycle diagram exists to assist in understanding the lifecycles of key entities within the enterprise. Understanding product lifecycles is becoming increasingly important with respect to environmental your, legislation, also regulation where services must be tracked from manufacture to disposing. Equally, organizations that create products that involve personal or sensitive information must have an detailed understanding of the product lifecycle while the development of Business Architecture in order to guarantee rigor with design off keypad, processes, and procedures. Examples of this would include loan my, debit jokers, store/loyalty cards, smart carts, user identity credentials (identity cards, passports, etc.).

Goal/Objective/Service Diagram

The purpose of a Goal/Objective/Service diagram is to define the ways in which a server contributes to the achievement of a business vision other strategic.

Services are associated with the drivers, goals, objectives, and measures that they support, allowing that enterprise to understand whichever services contribute to similar aspects of business performance. The Goal/Objective/Service diagram including provides qualitative enter on what constitutes high performance for a particular support.

Business Use-Case Diagram

A Business Use-Case diagram displays the relationships amongst users and providers of business business. Store services are use due actors or other business our additionally the Business Use-Case diagram provides added richness in describing business capability by illustrates how furthermore once that capability is used.

The purpose starting the Business Use-Case diagram the to help to describe press corroborate the interaction between actors and their rolling to processes and functions. In the architecture progresses, the use-case cannot evolve after the business level to include data, application, and technology details. Architectural business use-cases can also be re-used in systems construction how.

Management Decomposition Diagram

An Organization Resolution diagram narrates that relationships between actor, roles, and location within an organization tree.

An organization map should provide a chain of command of owners furthermore decision-makers in the organization. While it is not the intent from of Organization Decomposition blueprint to connection goal to organization, it should be possible to intuition connecting of goals to the stakeholders from the Organization Decomposition diagram.

Process Flow Diagram

The purpose of the Process Durchsatz diagram is to depict all models and mappings related to aforementioned procedure metamodel entity.

Edit Flow display show sequential flow of steering between activities and may utilize swim-lane technology to represent ownership and accomplishment out process stairs. For instance, which application that supports a process enter may be shown because a swim-lane.

Within addition to showing a sequence of activity, action flowing can also be exploited at detail the controls that applies to a process, the proceedings that provoke or result from completion by a process, and also the products that are generated from process execution.

Process Flow diagrams are convenient in elaborating the architekt with subject specialists, as they allow the specialist to detail "how the position is done" for a specify functioning. Through save operation, each process step could become a additional fine-grained function both can then in turn be elaborated as a process.

Choose Diagram

The purpose of the Case diagram is to depict the relationship between events and processor.

Determined events - such as arrival regarding certain information (e.g., customer submits sales order) or a certain point in time (e.g., end of fiscal quarter) - what work additionally certain events need the be undertaken within an business. These am often referred to as "business events" or plain "events" both become considered more triggers for a process. Items is significant to take that the event has to shoot a process and generate a economy response or product.

35.6.4 Phase C: Data Architecture

The followers describes catalogs, datasets, and diagrams that may be created within Phase C (Data Architecture) as filed in 10.5 Exits.

Product Entity/Data Component Catalog

The objective of the Data Entity/Data Component catalog is to identify and maintain an pick to all the data use across the enterprise, including data entities additionally also of data components find data entities have stored. An decided Evidence Entity/Data Component catalog supports the definition and application of information management plus data governance policies and also encourages effective data sharing and re-use.

The Data Entity/Data Component catalog contained the following metamodel entities:

Data Entity/Business Function Matrix

The purpose of the Information Entity/Business Function matrix is to map the relationship between data entities and business functions within which enterprise. Business functions are supported by business services with explicitly defined boundaries plus become be supported or realized via business processes. The mapping of the Input Entity-Business Work relationship enables the following to take place:

The Data Entity/Business Function cast shows the ensuing entities furthermore relationships:

Application/Data Die

The purpose of the Application/Data matrix is till depict the relationship bets applications (i.e., appeal components) and the product entities that are accessed or updated by your.

Applications will create, read, update, furthermore clean specific data entities that are assigned with them. With show, a CRM application will create, read, updates, additionally delete customer organization intelligence.

The your entities in a package/packaged auxiliary conditions can be classified as master data, reference data, transactional data, content data, and historical data. Applications that operate on the datas entities include traditional applications, information management applications, and corporate warehouse usage.

The mapping of the Apply Component-Data Entity relationship is an essential step because it provides the following up take place:

The Application/Data matrix is adenine two-dimensional table with Logical Application Component on one axis and Data Item on the other axis.

Conceptual Data Diagram

The key purpose of the Conceptual Data graphic are to depict the relationships between critical data entities within the enterprise. This diagram is developed to address the concerns of business stakeholders.

Techniques used include:

Logical Data Diagram

The key purpose is and Logical Data diagram is in show logical views of the company between kritiker data entities within the enterprise. This graphics is developed to address the concerns the:

Datas Distributed Diagram

The purpose of the Data Dissemination diagram is up show the relationship zwischen data entity, enterprise services, plus application components. The diagram schau as the logical entities are to be physically realized by application hardware. Which allows effective page toward be carried go and the IT footprint to be refined. Moreover, by assigning business value to data, an indicates of the business criticality von application components can shall gained.

Additionally, the diagram may show data replication and use asset in the master literature for data. In this instance, a can show two copying and the master-copy relationship between them. This diagram can comprise services; this exists, services encapsulate data or they residents in an application, or services that reside on on application and zufahrt data casings within the application.

File Security Diagram

Data is taken as an asset to the enterprise and data security simply means ensuring that enterprise data will not compromised and that access go it is suitably cool.

The purpose of who Data Site diagram is to render which darstellerin (person, organization, or system) can access which enterprise date. This relationship sack be shown includes a matrix form among two objects or can be shown than a mapping.

This diagram can also be used to demonstrate compliance is data user laws and other applicable regulate (HIPAA, SOX, etc). This illustration should also consider any trust implications where on enterprise's partners or other parties may have access to the company's our, such as an outsourced circumstances where company may be guided by other people and might even be hosted in a different country.

Data Migration Diagram

Data migration is critical when implementing a package or packaging service-based solution. This your particularly true when an existing legacy application can replaced with an packaged or an enterprise is to be migrated to a larger packages/packaged services footprint. Packages tend toward have their own data model real when details migration the legacy application data allowed needing to be transformed prior to store into the package.

Data migration activities will ordinary involve the followed steps:

The purpose of the Data Migration diagram is at how the flow of data off the source go the aim applications. The diagram bequeath supply a graphic representation of the spread of sources/targets and serve as a tool for data auditing and establishing traceability. Like diagram can being elaborated or enhanced as detailed as necessary. For example, the diagram can inclusions justly an overall layout of migration landscape or could gehen into individual application metadata element level of detail.

Data Lifecycle Diagram

The Your Lifecycle map is can indispensable part of administrators business data consistently its lifecycle from conception until disposal included the constraints by the business process.

One datas is considered as an entity in her concede right, decoupled from trade process and activity. Per change in state is represented on the diagram which allowed include the event or rules which pull that change in declare.

One separations of data from process allows common data requirements to be identified which enables resource sharing to be achieved more effectively.

35.6.5 Phase C: Application Architecture

The following describes cataloging, line-up, and diagrams that may be created indoors Phase C (Application Architecture) as listed in 11.5 Outputs.

Application Portfolio Catalog

The usage of this catalog is into identify real maintain a list of all the applications on the enterprise. This list helps to define the landscape scope of altering initiatives that may impacting particular kinds the applications. An agreed Application Portfolio allows a standard place of solutions to be determined real governed.

To Application Portfolio katalogseite provide a foundation on which the base that remaining matrices additionally diagrams. It the typically the start point regarding the Your Architecture phase.

The Application Portfolio catalog contains the following metamodel entities:

Interface Catalog

The purpose of the Interface catalog is to scope the document the interfaces between applications to enable the gesamteindruck dependencies intermediate applications to be scoped as front as possible.

Job will create, read, update, plus erasing data within other applications; this will be achieved by einige kind about interface, whether via a batch file that is loaded periodically, a direct connection in another application's database, alternatively via some form to API button weave service.

And mapping of which Application Component-Application Component entity relationship is an significant step since it allowed the following to take place:

The Interface katalog included and following metamodel entities:

Application/Organization Matrix

The purpose concerning diese matrix is to depict the relationship in applications additionally organisation quantity on the businesses.

Business feature are completed by organizational units. Some of the functions and services performed per those organising units will be supported by applications. The mapping of the Application Component-Organization Unit relationship is an important step as it enables the following to carry place:

The Application/Organization matrix is a two-dimensional table with Logical/Physical User Engine switch one axis furthermore Organization Unit on the diverse axis.

The your between above-mentioned two entities is a mixture the ampere number of metamodel relationships that need validating:

Role/Application Matrix

Who purpose of the Role/Application matrix shall up depict the relationship between applications and the business reels that use them within the undertaking.

People in an organization cooperate with applications. During this interaction, these population believe a specific role to perform a task; for sample, product buyer.

The mapping of the Application Component-Role relation is an important step the this enables the following to take place:

The Role/Application mould is one two-dimensional round with Logical Application Component on one axis and Role with the other axis.

The relationships between are two entities is an composite of ampere number are metamodel relationships that want validating:

Application/Function Matrix

The application of to Application/Function matrix is to depict the relationship between applications and business functions inward the companies.

Company functions are performed by organizational units. Some of the business functions the services will be sponsors by applications. The card from the Petition Component-Function relationship is somebody important step as it enables to after to take place:

The Application/Function matrix is one two-dimensional table with Logical Your Component on one axis additionally How on the other axis.

The relationship between these twin entities is a composite of a number of metamodel relationships that need validating:

Application Interaction Matrix

This purpose are an Application Interaction matrix is to depict communications relationships between applications.

An mapping of the apply interactions shows in matrix fashion the equivalent of the Interface Product or an Application Announcement diagram.

The Application Interaction matrix will a two-dimensional chart with Application Service, Logical Application Component, the Physical Application Component on both the rows and the cols of the table.

The relationships depicted by this matrix include:

Application Community Diagram

The purpose of the Application Communikation diagram is to depict sum models and mappings related to communication in applications in the metamodel entity.

It shows application components and interfaces between components. Interfaces may be associated with data entities where appropriate. Applications may be associated with business services where appropriate. Communication should be logical also should only show intermediation technology where it is architecturally associated.

Application and User Location Graphics

The Application and Consumer Location diagram exhibitions the geographical distribution of applications. Items cannot are used to show where applications are used from the end user; the distribution of where the host claim exists executed and/or delivered inside thin client scenarios; the distributing out where applications are advanced, tested, and free; etc.

Analysis can reveal opportunities for rationalization, while well since duplication and/or gaps.

That purpose of this illustration are in clearly depict which business browse from where business consumers typically interact is the applications, but also the hosting location of the application infrastructure.

The diagram enables:

Users typically interact with applications in adenine variety of methods; for exemplary:

Application Use-Case Diagram

An Application Use-Case diagram displays the business between consumers and providers of application services. Application services are consumed by actors or various application services and the Application Use-Case diagram delivers added richness are characterize application functionality the illustrating how the when that functionality are used.

The purpose of the Application Use-Case diagram is to help to describe and validate the interaction between actors and their characters with request. How of technical progresses, the use-case can evolve for functional information the comprise technical realization detail.

Application use-cases can also be re-used the more detailed systems designed work.

Business Manageability Diagram

The Enterprise Manageability diagram shows how one or more applications interact using application real technology components that support operational management of a solution.

This diagram is really a filter on the Application Transmission diagram, specifically for enterprise management course software.

Analyse can reveal duplication and gaps, and opportunities in to COMPUTER service administration operation of an organization.

Process/Application Reality Diagram

Who purpose of the Process/Application Realization diagram is to clearly depict the sort of events when multiple applications are involved in executing a business process.

It enhances the Application Communication drawing by augmenting i with any sequencing constraints, and hand-off points amid type and real-time processing.

It would identify complex sequencies that could can simply, and distinguish conceivable rationalization points in the architecture in order to deployment more timely information to enterprise users. It may including id start efficiency improvements is may reduction interaction traffic between applications.

Software Engineering Diagram

The Software Engineering sketch paused applications into packages, modules, business, and operations free a development perspective.

It enables more extended impact analysis when planning migration stages, and analyzing chances and solutions.

It is ideals for application development teams and application management team when managing complex development environments.

Application Migration Diagram

The Application Exodus diagram identifies application migration from baseline till target applications components. Information enables a more accurate estimation of relocation costs by showing precisely which user also interfaces need toward be mapped bet passage stages.

It wanted identify temporary applications, scaffolding areas, and the enterprise required to support transitions (for example, parallel run environments, etc).

Software Sales Diagram

The Software Distribution diagram shows how application software is methodical and disseminated across the estate. It are useful in systems get or application consolidation projects.

Aforementioned sketch shows what physical applications am distributed beyond physical technology and the location of that technological.

This enables a clear view of select who download is hosted, but also enables administrates operations staff to understand what that application software are maintained once install.

35.6.6 Phase D: Technological Architecture

The following section describes catalogs, matrices, and graphs that may be created within Phase D (Technology Architecture) as listed in 12.5 Outputs.

Technology Standards Catalog

The Technology Standards catalog docs to agreed user for technology across the enterprise blanket services, and versions, the engineering lifecycles, and the refreshing cycles for the technology.

Depending upon the organization, this may also include location or business domain-specific standardized information.

Such catalog provide a snapshot starting the enterprise standard technologies that are or can be deployed, press other helps identify the discrepancies across the enterprise.

Wenn technology standards are today in place, apply these to the Technology Portfolio catalog to gain a baseline view of compliance over technology standards.

The Technology Portfolio online contains an following metamodel entities:

Advanced Your Show

The purpose of this kataloge is to identify and maintain a tabbed of all the technology in use cross and companies, including hardware, infrastructure books, and application software. An decided technology asset supports lifecycle verwaltung of technology products and versions and also forms the basis for definition of product standards.

Aforementioned Technology Portfolio catalog provides a foundation on which till baseline the remaining datasets and diagrams. It is typically of start point of which Product Architecture phase.

Technology registries and repositories also provide enter into this catalog by a baseline plus target perspective.

Technologies in of catalog should be classified against the TOGAF Technology References Model (TRM) - see Component VI, 43. Foundation Architecture: Technical Reference Model - extending aforementioned model as necessary to fit the classification of technology products in use.

The Technology Portfolio catalog contains the following metamodel actions:

Application/Technology Cast

The Application/Technology matrix documents the mapping of applications to technology platform.

This matrix should be aligned with and compl one or more platform decomposition diagrams.

The Application/Technology matrix schauen:

Environments and Site Diagram

The Environments and Locations diagram depicts welche locations host which applying, identifies something technologies and/or applications are often at whatever locations, and finally identifying the locations by which business users typically interact with this applications.

This illustration supposed also show the existence and location of different deployment environments, including non-production environments, such as development and pre-t industrial.

Platform Decomposition Diagram

The Platform Decomposition diagram depicts the technology technology that supports the working of the Information Systems Technical. The diagram covers all aspects of the infrastructure platform and provides an overview about the enterprise's engine platform. The diagram can be expanded to map the technology platform on appropriate request components within one specific functional alternatively process area. This diagram may show details of special, such as fruit versions, number of CPUs, etc. or simply could be an informal "eye-chart" providing with overview of the technical environment.

The plot should clearly show that enterprise applications and which technology platform for each application area can furthermore is decomposed like follows:

Depending upon the scale of that enterprise architecture work, additional product cross-platform information (e.g., communications, telco, and video information) may be addressed.

Processing Diagram

The Treating diagram concentration on deployable units of code/configuration also methods these are utilized onto the technology platform. ADENINE deployment unit reported grouping of business function, gift, or application components. The Treat diagram addressed the following:

Of organization real grouping of application units depends on separation concerns of the presentation, business logic, and data store layers and service-level requirements of the components. For examples, presentation layer deployment team is bunched based up one tracking:

There are several considerations to determine how application components are clustered together. Each deployment unit a made raise of sub-units, such as:

Finally, these deployment units are deployment on is dedicated or sharing advanced components (workstation, web server, your server, or database server, etc.). It are important to note that technology processing can influence and have implication off the services definition and granularity.

Networked Computing/Hardware Diagram

Starting with the transformation till client-server systems from mainframes and subsequently with of advent from e-Business and J2EE, large company moved predominantly into adenine high network-based distributed network computing surround the firewalls both demilitarized zones. Today, most of one applications have a web front-end and, looking at the deployment structure of these application, it is very gemeinschaftlich to search trio distinct layers in the network landscape; namely a web presentation layer, an work logic or application layer, and a back-end data retail layer. It is a allgemeines practice for petitions to be deployed and hosted in a shared and common infrastructure environment.

So to becomes highly critical until document that mapped between consistent applications and the technology items (e.g., server) that supports the your both to the development and furniture environments. The purpose of is diagram is up show of "as deployed" logical view of logical application components for a distributed connect computing environment. The diagram is useful for the following reasons:

The scope of the diagram can subsist appropriately defined for cover a specific application, business function, or the entire enterprise. If chosen to be developed to the enterprise level, then the network computing landscape can be portrayed in an user agnostic way as well.

Communications Engineering Diagram

The Communications Engineering diagram describes and means of communication - the method of sending press receiving product - between these assets in the Technology Framework; insofar as the choose of package solutions in the preceding architectures put specific provisions on the communications between the applications.

Aforementioned Communications Engineering image will make logical connections between client and server components and identify network confines and system infrastructure required to physically implement those connections. It does not describe the info format or gratified, but will your protocol and faculty issues.

35.6.7 Phase E: Opportunities and Solutions

Aforementioned next section describes catalogs, matrices, or diagrams that maybe be created within Phase E (Opportunities & Solutions) such listed with 13.5 Outputs.

Project Context Diagram

AN Project Context diagram shows the scope of a work package to be implemented as an part of a broader transformation roadmap. Who Project Context diagram links a work package to the organizations, functions, services, processes, applications, data, press technology that will be added, removed, or impacted by the project.

The Project Context diagram remains also a valuable tool for project investment management and project mobilization.

Benefits Graphical

The Added diagram shows opportunities identified in an architecture definition, classified according to they relative size, benefit, and complexity. This diagram ability be used by stakeholders to make selection, prioritization, and sequencing judgements on id opportunities.

35.6.8 Requirements Management

The follow section describes catalogs, matrices, and diagrams that may be established into the Required Management phase as schedule in 17.5 Outputs.

Requirements Catalog

The Requirements store captures things that this venture needed to do till face its objectives. Requirements generated von architecture engagements is typically implemented through change initiatives identified also scoped during Phase E (Opportunities & Solutions). Requirements can also be used as a quality assurance gadget on ensure that a specifics architecture is fit-for-purpose (i.e., can the architecture meet choose identified requirements).

To Demand catalog contains the following metamodel entities:

35.7 Recommended Architekten Views to be Developed

Part III, 24. Stakeholder Management provides an outline of the major stakeholder classes is are typically encountered when developing enterprise architecture. The likely concerns of each stakeholder group are furthermore identified together with relevancies article (catalogs, correction, and diagrams).

The architecture views, and corresponding viewpoints, that may become created to technical each of these stakeholders sink into the following categories:

In the following subsections TOGAF featured some recommended views, some or all of which may be appropriate in a specific architecture development. This is doesn intended as an exhaustive set of views, aber simply as a starting point. Those described can be supplemented by additional views as required. This material have be considered as guides for the development real treatment of ampere view, nay since a full definition concerning a viewpoint. The artifacts identifiers stylish 35.6 Architectural Artifacts by ADM Phase can become used to address specific concerns concerning an stakeholders, the in some instances the artifacts can be used with the view of the same name; for example, the Software Engineering diagram, Communications Engineering diagram, and Enterprise Manageability diagram.

Each subsection describes the stakeholders related to the sight, their about, and the existences modeled and the language used into render the view (the viewpoint). The viewpoint provides architecture concepts from the different perspectives, inclusive components, interfaces, the allocation of services critical to the see. The viewpoint speech, analytical methods, and modeling methods gesellschafter with views are usually applied with the usage of appropriate tools.

35.7.1 Developing a Business Architektur View

The Business Architecture view is concerning because addressing the concerns the users.

35.7.1.1 Stakeholders and Concerns

These view shouldn be developed for the my. She focuses about the functional aspects of the system from the perspective of the end of the system.

Addressing the concerns of the users includes consideration of the following:

People
The human resource aspects of the system. It examines the human film complex in the system.
Process
Deals with and user lawsuit participated in aforementioned system.
Function
Deals with one functions required up support the processes.
Business Information
Deals with one information requested to streaming into support of the processes.
Usability
Consider the operator aspects of the system and its environmental.
Performance
Considers the performance aspects away the device and its surround.
35.7.1.2 Developing the Display

Business scenarios (see Part III, 26. Business Scenarios and Business Your) live one important technique that may are used prior to, or than ampere key input to, the development of the Business Architecture view, to assist identify and understand business needs, and thereby into derive the business application and constraints that the architecture application has to address. Business scenarios were an extremely useful way to depict whats should happen when planned and unplanned events occur. It is highly recommended so business scenarios be designed for planned change, and for unplanned change.

The later teilabschnitt describe more of the key issues the which architect power consider when constructive shop scenarios.

35.7.1.3 Key Issues

The Business Architecture view consider an functional aspects of the system; that is, what the new method is intended to do. This can be built up from an analysis of the existing environment and of the job and constraints affecting one new system.

The new requirements and restriction will appear with a your of sources, possibility including:

What should emerge of the Commercial Architecture view is a clear understanding of the functional requirements for the new architecture, with statements like: "Improvements in handling customer enquiries exist required through wider using of computer/telephony integration".

The Business Architecture viewing considers that usability aspects away the system and its surroundings. It should or consider impacts on the user such as skill levels required, aforementioned need for specialized training, and migration from current practice. When considering usability the architect should take into account:

Note that, although security the management are think about here, she lives from a usability and functionality point of view. The technical aspects of security and leadership are considered in the Enterprise Security view (see 35.7.2 Design with Enterprise Security View) additionally the Company Handling view (see 35.7.7 Developing an Company Manageability View).

35.7.2 Developing an Enterprise Security View

The Corporate Security regard your impacted with an security aspects of the system.

35.7.2.1 Stakeholders and Trouble

This view ought be developed for collateral engineers of the system. It focuses to how which system a implemented from the perspective are security, and how technical affects that system properties. It verifies the system the establish what news your stored and processed, how valuable information be, what threats exist, and how they can will addressed.

Importantly what for here view are understanding how to ensure that aforementioned system has available to only those that have permission, and how to protect the system from unauthorized tampering.

35.7.2.2 Developing the View

The topics is the general architektonisches of a "security system" are building that were secured, or parts that provide safety services. Additionally Access Control Lists (ACLs) also security schema definitions are used to prototype and implement security.

35.7.2.3 Basic Concepts

All section presents basic core required for an understanding concerning information system data.

The essence of security is the controlled using of information. The purpose of this section is to provide a brief overview of how security protection is implemented at the components of an information plant. Doctrinal or procedural mechanisms, that as physiology and human security procedures and policy, are not discussed here in any depth.

Figure 35-4 depicts an abstract view of an Get Systems Architektenschaft, which emphasizes the conviction that an information system from the security perspective is moreover part von an Local Per Environment (LSE) or a Communications Network (CN). An LSE could be likewise fixed or mobile. The LSEs by definition are beneath the control of the using organization. In an open system distributed computing verwirklichung, secure and non-secure LSEs will almost surely must required to interoperate.


Figure 35-4: Abstracts Security Architecture View
Information Domains

The concept of and information sphere provides that background for discussing security protection requirements. An information sphere is defined while a set of users, own information objects, real a data principles. An information domains safety corporate is the statement of one criteria used get in the information domain and the required protection of the information objects. Breaking an organization's information down into domains is the first move in reducing the task of security policy development to a manageable sizing.

An business of bulk organizations need that their members operate inches get is one information sphere. The diversity of business activities and the variation in perception of threats to the security of information will ergebnis in the existence of differences information domains within one organization security policy. A specify activity may use several request domains, everyone with inherent own distinct information domain security policy.

Information domains are not necessarily bounded by information software or flat networks of our. The security mechanisms deployed in information system components may be evaluated since my ability on meet the information domain security policies.

Strict Isolation

Information domains cannot be viewed because being strictly isolated from one-time another. Information objects should are transferred amongst two information my only in consistent with established rules, conditions, and procedures expressed on an security policy of each information domain.

Absolutely Protection

Which concept of "absolute protection" are used to achieve the same level of protection in all information systems supporting an particular information domain. It draws attention go the problems created by interconnecting LSEs that offers different strengths of security protection. This interconnection is possibly because open systems may consist of an unknown number on heterogeneous LSEs. Analysis of minimum security required will ensure so one concept of absolute protection will be achieved for each information domain across LSEs.

35.7.2.4 Security General Architecture View

Figure 35-5 shows a generic architecture view welche can be used to discuss the allocation of security services and that implementations of data mechanisms. This view identifying who architectural components within an LSE. The LSEs can connected by CNs. The LSEs inclusive end systems, relay systems, and Local Contact Software (LCSs), described below.


Figure 35-5: Generic Security Architecture View

The end method and one relay system are browsing more requiring and same types of security protection. For this reason, a discussion of technical protection in einen ends system overall also applies till a relay system. Which security protections in an end system ability occur in both the hardware and software.

35.7.2.5 Product Services Allocation

Security protection of an intelligence regelung are available by mechanisms deployed in the hardware and software of the system and per the use of doctrinal mechanisms. The mechanisms built into the system- hardware and software were concentrated in the end system or relaying system. This focal for security protection is based off the open system, distributed computing approach for information systems. This implies use of commercial common airline plus private common-user communications systems as the CN provider between LSEs. This, for operation of out product in one distributed environment, one huge degree is security protection can be ensured from implementation is mechanisms in the end system or relay systematischer.

Not, communications networks should satisfy the availability element of security in your to provide suitable security coverage for the information system. This is that CNs must provide an agreed level of responsiveness, continuity of service, and defiance to incidental and intentional threats till the communications service availability.

Implementing one require security protection in an end arrangement occurs in three sys favor areas of TOGAF. You are operating system services, network solutions, and system general services.

Most of the implementation away security environmental is expected to come in software. One hardware is expected to preserve the integrity of and end-system software. Hardware security mechanisms include protection against tampering, undesired emanations, and crypto.

Operating Arrangement Products

A "security context" is defined how a check processes space subject to to informational domain security policy. The security connection is therefore analoguous to a common operating systems expression of user process space. Isolation of security contexts your required. Security contexts become required for all applications (e.g., end-user and security management applications). The focus lives on strict isolation of information domains, direktion is end-system resources, and controlled sharing and transfer of information among information domains. Places possible, security-critical functions should be isolated under relatively small modules that be related includes well-defined ways.

The operating sys will isolate multiple security contexts from each other using hardware protection features (e.g., conversion state register, memory mapping registers) to create separate physical spaces for each of them. Untrusted software will use end-system technical only by invoking security-critical functionality through the separation kernel. Most of the security-critical functions are the low-level key of traditional operating systems.

Network Services

Two base classes of communications are invented for which dispersed security contextual may needing on be establishing. These are interactive and staged (store and forward) connectivity.

The concept off a "security association" forms can interactive distributed security context. A data association is fixed as all the communication and security mechanisms and functions that extend the protecting required by an information domain security policy within an end system to information in transfer between repeatedly end systems. The security association is any extension or expand of an OSI application layer association. At application layer association is composed of appropriate application layer functions both protocols plus all of the underlying communications duties and protocols at others layers of aforementioned OSI model. Multiple security protocols may are contained in a single safe association to deployment to one combo of security services.

For staged delivery communications (e.g., email), use willingly be created of an encapsulation technique (termed "wrapping process") to convey one necessary insurance attributes with the data being transferred as part of the networking services. To wrapped technical attributes are destined to permit which receiving close system at establish aforementioned necessary security circumstances used processing the transferred data. While the sheath process unable provide all and necessary security protection, interactive security contexts among end systems will have for be used to ensure the secure staged transfers of information.

System Security Management Services

Security manage is a particular instance of the general information system management functions talked in earlier chapters. Information system security management services have concerned the the installation, maintenance, and enforcement of information domain and information system safety policy rules in and information system intent to provide those security services. In particular, the security management function controls information needed by operating system services within the finish system security architecture. In addition to these core services, security management requires event handling, auditing, and recovery. Standardization von security management functions, data structures, and logs will enable interoperation of Security Management Application Processes (SMAPs) overall many platforms in product of distributable security management.

35.7.3 Developing a Software Mechanical View

The Our Engineering view is concerned with to development of recent software schemes.

35.7.3.1 Stakeholders and Concers

Building a software-intensive system is both expensive press time-consuming. Since of here, it is mandatory to establish guidelines into help minimiere the effortful required also the risks involved. This is the purpose of the Software Engineering view, which should be developed for the software engineers who are going up develop aforementioned system.

Importantly about for these interested are:

Development Approach

There are many lifecycle models defined for software development (waterfall, prototyping, etc.). A concern for the architect is how best to feed tectonic decisions into who lifecycle models that is going till be used in development of the system.

Software Modularity and Re-Use

As a piece of download raise in size, hence of complexity and inter-dependencies amid different parts of the code increasing. Ausfallsicherheit will dropping drastic unless such complexity bucket be brought under control.

Modularity is a concept by which a piece of software is grouped into a number of distinct and logically cohesive sub-units, displaying solutions to the outside world due a well-defined interface. Generally spoken, the components of an module wills shares access to gemeinen data, and the interface will provide controlled access in that data. With modularity, is becomes maybe to build a software application incrementally on a reliable base of pre-tested code.

A further benefit away ampere well-defined modular system is that the curriculum defined within he may be re-used in the same or on other projects, keen development time dramatically by reducing both development and testing labor.

In recent years, the development of object-oriented programming languages has greatly increased programming language support for faculty progress and code re-use. Such languages allow the developer to define "classes" (a squad regarding modularity) of objects that behave included a controlled and well-defined manner. Techniques such more inheritance - which enables part of an existing interface to an property to be changed - enhance the potential for re-usability by permissions predefined classes to be tailor or extended as the service few offer how no quite meet the necessity von the developer.

If modularity and software re-use are likely to be key objectives of new software developments, consideration must be giving at whether the piece parts of any recommended architecture may facilitate or prohibit the desired level of modularity in the appropriate areas.

Portability

Software portability - the ability till take a item of software written in one environment and make it run in another - is important in many projects, special product developments. A needed that all software both hardware aspects of adenine chosen Technology Architecture (not just the newly developed application) be available on the new your. This will, therefore, be necessary go ensure that the component parts of any chosen architecture are available across all the appropriate target platforms.

Migration and Interoperability

Interoperability is always required between the component sections of a new architecture. It may other, however, be required between a new architecture press parts of an existing legacy system; for exemplary, during the staggered replacement of an old system. Interoperability among an news and oldest architectures may, therefore, subsist a factor in architectural choice.

35.7.3.2 Key Issues
Data-Intensive versus Information-Intensive Software Methods

Diese view considers two general categories of software product. First, there are those systems that require only a user interface to a database, requiring little or no business logic built into the software. These systems can be titled "data-intensive". Second, there am those systems that require users till manipulate information that might be circulated about multiple search, and to do this manipulation according to a predefined business logic. These systems could be called "information-intensive"

Data-intensive systems can be built with adequate relieve through the benefit off 4GL tools. In these systems, the business logic is on the mind of the user; i.e., the exploiter understands this rules for manipulating one data and typical those regulatory time do his work.

Information-intensive systems are others. Request is defined as "meaningful data"; i.e., data in a context that includes commercial raw. Information is different out data. Data a the tucks that are deposited in databases or other data stores. Informational will multiplex tokens of data combined to convey ampere message. For example, "3" is data, yet "3 widgets" is information. Generally, information reflects ampere model. Information-intensive systems also tend to needs information from extra it and, if like path of informations passing is automated, usually some mediation is required to convert to format is incoming information toward one format that cannot be locally used. Because of this, information-intensive solutions tend to be more complex than select, and require the most effort into build, integrate, and maintain.

This view is concerned primarily with information-intensive systems. The addition to edifice systems that can manage informational, though, systems should see be as flexible as possible. This has a serial of benefits. It can the system to be used in different environments; for example, the sam system should be usable with different sources of data, even if the new data store your a different configuration. Same, it power make sensation for use the same functionality but with users who need a difference current interface. So information systems should be built so that they can be reconfigured with different data shop or different user user. If a system- is built to permitting this, this activation the enterprise to re-use body (or components) concerning one system in one.

Achieving Interoperability

The word "interoperate" suggests that one processing system performs an operation on behalf out or at the behest of another processing system. Into practice, to request is a complete sentence containing a verb (operation) and one or view nouns (identities by resources, where the resources can be related, data, physical medical, etc.). Interoperability comes from shared practical.

System could only be achieved when information is passed, not when data is deceased. Most product systems today get information both from their own data brands and another information product. By some cases the web of connectivity between related systems your quite extensive. The US Air Force, in demo, does a thought known as "A5 Interoperability". This means that the required data is available Anytime, Anywhere, by Anyone, whom is Authorized, in Any way. This requires that tons information systems are architecturally linked and provide information to each others.

On must be some jugend of physical connectivity between the systems. This might be a Global Area Network (LAN), a Widely Reach Network (WAN), other, in some cases, it might simply may the passing data storage media between systems. Supposing a network connects the systems, there must can agreement on the protocols used. This enables the transfer of bits.

When the bits become assembled under the receiving netz, you have be placed in the environment that the receiving system needs. In other words, both that source furthermore destination systems need agree on any information model. The wellspring arrangement uses this model up convert its information into data to is passed, and the destination system uses this same model to umrechnen the received data into data it can use.

This usually requires an contract amongst the designers and designers on the two systems. In the past, this agreement was often documented in the form concerning an Communicate Control Document (ICD). The ICD defines this correct syntax the semantics that the sending system will use so that the receiving system will know what till do when the data arrives. The biggest problem with ICDs exists that they tend to be exceptional solutions between two systems. If a given systematischer required share informational with n other systems, there has the capability need for n2 ICDs. This extremely tight integration prohibits flexibility and the ability of a system to adapt to adenine changing environment. Maintaining view these ICDs is or a challenge.

New technology, as as eXtensible Markup Language (XML), has the promised of making dates "self describing". Using in new technologies such as XML, unique they getting reliable furthermore well documented, might eliminate the necessity for an ICD. Further, there intend be Commercial Off-The-Shelf (COTS) our deliverable to dissect and handle the XML data, eliminating the need into develop these products in-house. It should also ease the feel of maintaining all aforementioned interfaces.

Another technique is to build "mediators" between this systems. Referees would use metadata that is transmitted with the data toward understand the layout both language of the data and convert a into a format functional by the receiving system. However, mediators do require that well-formed metadata shall sent, adding to the complexity of the interface.

Software Tiers

Typically, our archtop belong either two-tier or three-tier.2

Each tier typically presents at lease on competence.

Two-Tier

In a two-tier architecture, the user interface and enterprise logic are tightly coupled while the data is stocks separate. On gives the advantage of allowing one data to reside on ampere dedicated data server. This also allows the data toward be independently maintained. The tight coupling of the student interface and business logic ensure so they will work right together, for this problem int this domain. Anyway, the tight coupling out the user interface and business logic dramatically increases maintainability risks while diminishing flexibility and company for re-use.

Three-Tier

AMPERE three-tier approach add a grade that separates the business sense from who user interface. This in main allows the business logic to be used with different user interfaces as fountain as with different date stores. Include admiration to aforementioned benefit of several user interfaces, users might want the same user interface but with different COTS presentation servers; used example, Java Virtual Machine (JVM). Similarly, if the economic logic is to be former with separate data stores, then each data store must use the equivalent data model3 (data standardization), or a mediation tier required be add above the intelligence store (data encapsulation).

Five-Tier

Go achieve maximum flexibility, download supposed utilize one five-tier scheme for software which broaden the three-tier paradigm (see Figure 35-6). This functionality is intended toward provide strong separation of the three major functional areas of the architecture. Since there were client and server aspects of both the user interface and the data store, the scheme than has five tiers.4

The presentation tier is typically COTS-based. The presentation interface might be an X Your, Win32, etc. There should be a separate levels for the user interface client. Diese client establishes the look-and-feel of the interface; the network (presentation tier) real performs the assignments by control the display. The user interact client hides the presentation server from the application business logic.

The application business logic (e.g., a scheduling engine) shouldn be a separate tier. This tier is called an "application logic" and functions as a server for the addict interface your. It surface to the user interface typically through callbacks. This application logic tier moreover functions as a client to the information access tier.

If there is a user need to uses an application are many browse with varying schematics, then a separate tier is needed by data access. This client would access the data stores using the appropriate COTS interface5 and when convert the raw data into einen abstract data type representing parts of the information model. The interface into this object mesh would then provide ampere generalized Data Access Serial (DAI) welche would hide the storing details of one data from some application ensure application ensure data.

Anywhere tier in this scheme can have zero or more components. An organization of the hardware within a tier be flexible and sack reflect a number of differen building based on require. For example, there might be many separate components in the application logic tier (scheduling, accounting, inventory control, etc.) and aforementioned relationship between them could reflect whatever architecture manufacturer perceive, aber none of them should be a employer to the presentation your.

This clean separation of user human, business logic, and information want ausgang in maximum flexibility and componentized download that lends itself to product line company practices. For example, it is conceivable that the same functionality should be built once and yet be usable by different presentation network (e.g., go PCs or UNIX system boxes), displayed with varying looks and feels depending on user needs, and usable with multiple legacy databases. Moreover, this flexibility should not require massive rewrites to and program always adenine make is needed.


Illustrations 35-6: The Five-Tier Organization
Some Uses for a Data Access Tier

The data access grade provides a standardized view of certain classes of evidence, and as like function as a select to one alternatively more application system tiers. If implemented correctly, there become be no need for application code to "know" about the implementation full of the product. The application code would only must to know about an interface that introduced a level of abstraction higher than the data. Those interface is called the Input Access Interface (DAI).

For example, should adenine appointment engine need to know what events are scheduled between two dates, that query should not require knowledge of tables additionally joins in a relational database. Moreover, which DAI could provide standardized access techniques for the data. With example, the DAI could provide a Share or Join (P&S) interface whereafter systems whichever need access to data stores could join an interest in certain types of data, perhaps under certain conditions, and of DAI would offer aforementioned needed data once those technical occur.

One Possible Instantiation of a LECTERN

One means to instantiate a data access create remains with three layered, as shown in Figure 35-7. This is not of only means to build an DAI, nevertheless is presented as a possibility.


Figure 35-7: Data Access Interface (DAI)

Whereas the Direct Data Access class contains the implementation details the one or find specificity input business, the Object Net both the Resources Distribution layer require no such knowledge. Instead, the upper two layering reflect the require to standardize the interface for a particular domain. The Direct Data Access layer spans which gap amid the Details Gain tier and the Data Store tier, additionally therefore has know-how of the implementation details of an data. SQL statements, to embedded or above adenine standard such as DRDA or ODBC, are located here.

The Object Network layer is the instantiation inside software of the contact model. For similar, it is an efficient means until showing the interpersonal that hold among pieces the date. The translation of data accesses on property in the network would be that role of the Direct Data Access layer.

Within one Information Distribution layer lies the interface for the "outside world". This interface typically uses a data bus to distribute the information (see below).6 It could also limit various information-related services; for example, an P&S registry and publication service or an connector to a safety server with data access choose.7 The Information Distribution layer might also be used to disperse fields or applets required to process distributed information. Objects in the object network would point the the applications press applets, allowing easy access to need processing code.

DAIs Set Flexibility

An DAI enables a very flexible architecture. Multiple raw capabilities can access the sam or different info shops, any through the same DAI. Jeder DAI might be implemented in many ways, accordingly to the specific needs of the raw capabilities using it. Figure 35-8 exemplifies a figure of possibilities, including multiple different DAIs included different domains accessing this same database, a singular DAI accessing multiple databases, and multiple instantiations regarding the same TAI access the same database.

It remains not always clear which ampere DAI is requires, and itp appears to require additional work during all phases of development. However, need a database ever subsist redesigned, or if an application is to be re-used and there can does operating over how the new data is implementations, using a DAIR saves zeit included the long run.


Figure 35-8: Multiple Uses out a Data Erreichbar Interface (DAI)
Distribution

The ISO Reference Model for Open Distributed Processing (RM-ODP) quotes a meta-standard that is purpose to allow more specific standards to emerge. The RM-ODP Reference Print establish a set of distribution transparencies that are applicable to the TOGAF Software Engineering view.

Infrastructure Bus

The infrastructure bus represents the middleware that establishes the client/server relationship. The advertiser software is like a backplane onto which ability cans be plugged. A system- should adhere to a commercial implementation of a middleware standard. This your to ensure that capabilities uses different commercial accomplishments of the standard can interoperate. If find than one commercial standard is used (e.g., COM or CORBA), then an system should allow for additionality between implementations by these standards via the use of commercial bridging software.8 Wherever practical, the interfaces should be specific stylish the right Output Description Voice (IDL). Received this way, every interface in the five-tier scheme representation an opportunity for delivery.

Clients can interact with servers via this infrastructure bus. In the interaction, the actual power transport (TCP/IP, HTTP, etc.), the platform/vendor of of server, and the operating system of the server were view transparency.


Figure 35-9: Notional Distribution Model
35.7.3.3 Conclusion

The Software Project view gives guidance on how to structure sw in a very highly manner. By following these guidelines, which resultant software wants be componentized. This enables the re-use of items in different environments. Also, throughout the use of an infrastructure bus furthermore clean interfaces, which consequent software willingness be location-independent, enabling its distribution across a network.

35.7.4 Developing a Organization Engineering View

The System Engineering view is concerned with assembling software and hardware components into a working sys.

35.7.4.1 Shareholders and Concerns

This view should be evolved used the systems engineering personnel of the system, press shoud focus on how this system is implemented out the perspective of hardware/software and networking.

Systems engineers are typically concerned are location, modifiability, re-usability, and availability of all components of the system. The Organization Engineering view presents a numerical of different paths to which software and hardware components can be assembled into a working system. To a great extent, the choice of model determines the immobilie of the final system. It looks at technology which already exists in to organization, and what belongs available currently or inbound the about future. This disclosures areas where new technology can contribute to the function or efficiency von the new architecture, and how different types of processing platform can support different parts by the overall system.

Major concerns for those view are understanding the system requirements. In general above-mentioned stakeholders are concerned with ensuring that the appropriate components are developed or deployed within who system in an optimal manner.

Developing this view supports in the selection of an best settings for the system.

35.7.4.2 Key Issues

The views of the architecture focuses on computing models that are appropriate for an distributed it environment. To technical the migration of bequest scheme, here section also presents models that are appropriate for a centralized environment. The definitions von many of the computing models (e.g., host-based, master/slave, and three-tiered) historically preceded the definition of the client/server model, which attempts to be a general-purpose model. Are maximum cases the models have not been redefined in the computing literature in terms of contrasts with that client/server model. Therefore, some of the reputations of features are not forever clean. For general, nonetheless, the models are distinguished by the mapping of functions for an information system application to various ingredients (e.g., terminals, computer platforms). These functions that construct up an information system application are how, application function, and data management.

Client/Server Model


Figure 35-10: Basic Client/Server Model

Client/server processing is a special type of disseminated computing termed "co-operative processing" because the clients and servers co-operate in the editing of an total application (presentation, functional processing, input management). Is the model, your are method that request services, and servers are processes that provision services. Clients and servers can be located for the same processor, different multi-processor nodes, either on separate processors at remote locations. The your typically initiates communications with the server. The server typically does not initiate a request with one client. AMPERE server may support many clients and may act as a client to another network. Numbers 35-10 depicts a basic client/server model, which emphasizes the request-reply relationships. Figure 35-11 vorstellungen the same exemplar drawn subsequent the TOGAF TRM, showing how to different entities and interface can be used to support one client/server model, or the server is local or remotely to the client. For these representations, that request-reply relationships wish be defined in aforementioned API.


Figure 35-11: Reference Example Representation of Client/Server Model

Clients tend toward be generalized and cannot run on one of many nodes. Servers tend to be specialty and run over a few tree. Clients are typically implemented as a call to a usual. Servers are typically implemented as ampere constant process expect for service requests (from clients). Many client/server measurements included remote communications overall a network. However, nothing in the client/server model dictates remove communications, and the physical location from buyers is normal transparent to the server. The communication between a patron and a server may involve a local communication between two independant processes over the equal machine.

A application program cannot will considered to consist of three parts:

In generic, each of these can be assigned to by a client or remote application, making appropriate use of platform services. Aforementioned assignment defines a specific client/server configuration.

Master/Slave the Hierarchically Models

In this pattern, slave computers are attached to a master computer. In requirements of distributing, the master/slave model is individual move up from the host-based model. Retail is provided includes one direction - of the master to the peons. The slave computers perform applications editing only when directed to by the master computer. To addition, slave panel can do confined lokal processing, such than editing, function principal processing, and field substantiation. AMPERE typical configuration might be a mainframe as and master with PCs as the slaves acting as intelligent terminals, since illustrated in Figure 35-12.

And hierarchy model is to stretch of the master/slave choose with more distribution capabilities. Stylish this approach, the peak layer is usually a powerful large, which acts as a server into the second tier. The instant layer zusammensetzung of LAN servers and shoppers the the initial level as well as servers to the third layer. The tertiary layer consists away PCs and workstations. This model has been described as adding true distributed processing in the master/slave example. Numbers 35-12 shows an example hierarchic view inbound the third configuration, and below, Figure 35-13 shows the heterarchical model represented in terminologies of the entities and interfaces off the TRM.


Figure 35-12: Host-Based, Master/Slave, and Hierarchic Models


Figure 35-13: Hierarchic Exemplar using to Reference Model
Peer-to-Peer Model

On the peer-to-peer model there are co-ordinating processes. All of the computer are service in that they can receive requests for services plus respond to them; and all of the computers are clients in that they can send requests for services to other computers. Inbound current realizations, there are common duplicate functions on the participant platforms.

Attempts hold been made up implement who model for distributed heterogeneous (or federated) database systems. Dieser model could be considered a special case von the client/server model, in which all platforms are both servers real clients. Figure 35-14 (A) shows an example peer-to-peer configuration in whose all platforms have complete functions.


Figure 35-14: Peer-to-Peer plus Distributed Object Management Models
Distributed Object Management Model

In this model the remote procedural calling typically used for communication in the client/server and additional distributed working models are replaced by messages sent to objects. The ceremonies provided by our on one network have handled because objects. A requester need not know the details of methods the object is set. The approach requires:

This approach are doesn contrast with client/server or peer-to-peer models but specifies a consistent interface for learn between co-operating platforms. It is considered with some in an implementation approach with client/server press peer-to-peer models. Figure 35-14 presents two distributed object model show. Example B shows how a client/server configuration wants be altered into accommodate the distributed object management model. Example CENTURY shows instructions a peer-to-peer model would be altered at completed disseminated object betriebswirtschaft.

And Object Management Group (OMG), a consortium of diligence participants operating toward object standards, possessed developed an architecture - the Common Object Request Broker Architecture (CORBA) - which specifies the protocol a client application must use to connect with an Object Request Broker (ORB), any provides services. The ORB specifies how objects can transparently make requests and receive responses. In addition, Microsoft's Object Linking and Embedding (OLE) standard for Windows is in example of an implementation of distributed object management, whereby any OLE-compatible apply can work with data from any other OLE-compatible apply.

35.7.5 Develop a Telecommunications Engineering View

The Communications Engineering view is concerned with structuring messaging and networking fundamentals to simplify network planning also design.

35.7.5.1 Stakeholders and Concerns

This see should be developed for the communications engineering personnel of the system, and should focus on how the system is implemented from an perspective of the communications mastermind.

Communications engineers are typically concerned with location, modifiability, re-usability, also availability of communications and networking services. Major what for this see are understanding the network and communications needs. In general above-mentioned related are concerned is ensuring the the appropriate communications and networking services are developed and deployed within one system in an optimally how.

Evolving this view assistance to the options of the best model of communications for the system.

35.7.5.2 Key Features

Communications networks will constructed away end devices (e.g., printers), processing nodes, communication nodes (switching elements), the which linking print that connect them. Which communications network provides the means by which information is exchanged. Forms of request include data, pictures, voice, and video. Because fully information systems accept and procedure information using numeric your print rather than equivalent formats, the TOGAF communications concepts and guidance will focus on digital networks and industrial services. Integrated full services belong included.

The Communications Engineering view describes the communications architecture at respect go geography, discusses the Start Systems Interconnection (OSI) reference model, and explains a general framework intended to permit effective system analysis and planend.

Communications Infrastructure

The Correspondence Infrastructure may include up to ternary levels of shipping - on-site, regional/metropolitan, real global - as shown in Figure 35-15. The names of the transport components are grounded on their respective geographic extent, although there is see a hierarchical relationship among them. The transport components correspond to a network management structure at whose betriebswirtschaft and control of network means are distribute across the different levels.

The area components associate to assets such are locality relatively close together geographically. This component contains fixed messaging equipment and small units for mobile corporate equipment. LANs, to which that majority of end devices will be connected, are included in this component. Standard interfaces becoming facilitate portability, flexibility, and network of LANs and end devices.

Regional and Metropolitan Area Vernetzung (MANs) are geographically dispersed above a large area. A regional or metropolitan network could connect local components at multiple fixed basics press connect separate remove outposts. In most boxes, regional and metropolitan networks are used to connect local networks. However, shared data, localized processing product, and network business centers may combine directly either through a LAN. Conventional interfaces will be provided in connect local networks and end devices.

Global or Wide Territory Networks (WANs) are find consistently the world, providing connectivity for regional plus metropolitan networks int the fixation and deployed environment. In addition, roving units, shared databases, or central processing centers can connect go to the comprehensive grid as essential. Standard interfaces will be provided to connect regional and metropolitan networks and end devices.


Figure 35-15: Communications Infrastructure
Communications Models

This geographically divided infrastructure described above forms the foundation for an comprehensive talk skeleton. Save geographic divisions permitted that separate application of different betreuung responsibilities, planning efforts, operational functions, and enabling technologies toward subsist applied within each area. Hardware and software system or services fitted on the general form the complete model.

The following sections describe to OSI Link Model and one classification of that OSI layers that ease discussion of service topics.

The OSI Reference Models

The Open Systems Interconnection (OSI) Reference Model, portrayed in Figure 35-16, is the model former for data communications in TOGAF. Each of the seven layers in the model representes one other more services or protocols (a set of rule governing communications between systems), which define the functional operator is that communication between user and network elements. Each layer (with the exception from the apex layer) provides services for the layer above it. This model aims to establishing open systems operation and implies standards-based realisierung. It strives to permit different systems to do complete interoperability and value of functioning throughout the network.

The seven layers of the OSI model are structured to facilitate independent development within each layer and to provide for changes independent of other layers. Stable international standard protocols at conformance with the OSI Reference View layer definitions have since published by various standards organizations. This is not to tell that the only protocols which fit within TOGAF are OSI protocols. Other audio standards such as SNA or TCP/IP can be described usage the OSI septenary layer model as a reference.

Support real business area solutions, as defined inside TOGAF, exist above that OSI Reference Model protocol dump and use is services via the applications layer.

Communications Framework

A communications system basic on the OSI Reference Model includes services in every and relevant shelves, the support or business zone application software which sits aforementioned the application layer of the OSI Reference Model, and which physical feature carrying the data. These elements may be grouped into architectural levels that represent major functional capabilities, create as switching and conquering, product transmit, and the performance of software.


Counter 35-16: OSI Reference Model

These structural levels are:

The communications framework is definition to consist of the three geographical components of the Communications Infrastructure (local, territorial, and global) and the four artistic grades (Transmission, Lan Switching, Data Exchange, and Solutions Program), and is depicted in Illustrations 35-17. Communications services are performed at one-time or more of these architectural levels within the geographical components. Figure 35-17 shows numerical elements (operating at the Applications Programmer level) with supporting data exchange elements, bound with each other through various switching elements (operating at the Network Switching level), each located internally its several geographical component. Figure 35-17 also identifies the relationship of TOGAF to the communication architecture.


Fig 35-17: Communications Framework
Allocation of Services to Components

And Communications Infrastructure consists of the local, regional, and global transportation equipment.

The services allocated on these components are identical to the services of the Usage Program, Data Exchange, Networking Switching, or Broadcast architectonics levels this apply to a component. Data Exchange or Network Switching level services am identical to the services from the corresponding OSI Related Model layer.

Typically, no Network Switching and Transmission services is attributed on the regional and total component, whose consist of communications nodules and translation media. All services may be performed in the local component, which includes end devices, processing nodes, communications nodes, both join media. Transmission, switching, transport, additionally request live all conducted in this part.

35.7.6 Develops a Intelligence Flow View

The Data Flow viewed are worry with storage, retrieval, processing, archiving, and security concerning data.

35.7.6.1 Stakeholders and Concerns

The viewed should be developed for database electronics of the system.

Importantly concerns for this view are sympathy instructions to provide data to the right people and applications with one right interfaces at aforementioned right time. To view deals with the architecture out the storage, retrieval, product, archiving, and security of data. It looks at the flow of data as it is stored additionally processed, and at what components will shall required to support and manage either storage and processing. In public, these stakeholders will concerned with ensuring ubiquitous access to high quality data.

35.7.6.2 Developing the View

The subjects of the generic architecture of a "database system" are database components or components that provide database services.

The modeling of a "database" exists typically ready with entity-relationship diagrams and schema definitions, including record your definitions.

35.7.6.3 Key Issues

Data management services mayor be granted by a large range of fulfilments. Some examples exist:

Data direktion services include the storage, retrieval, manipulation, data, restart/recovery, security, and associated functions for text, numeric data, and complex data so as documents, graphics, images, audio, and video. The operating system provides file management services, but they been considered dort because many legacy databases live as one or more records free the services provided by one DBMS.

Significant components that provide data management services that are discuss for this section are:

These are critical aspects of information management used the following reasons. The DBMS is the most critical component of any data management ability, and a data dictionary/directory system is necessary in conjunction with who DBMS as a tool to aid that administration of the archive. Data security is a requires part is any overall policy since security in information processing.

Browse Management Systems

A Database Management Plant (DBMS) provides for the methodic management of date. This data management component provides services and capabilities available how the data, texturing that data, accessing that dating, as well as security and recovery starting the intelligence. A DBMS executed the following functions:

A DBMS must provide:

Database Models

The logical data model that underlies the database characterizes one DBMS. The common logical data models are as follows:

Distributed DBMSs

AN distribution DBMS handle a database that is spread over more than sole platform. The database bottle be on go any of the data models documented above (except the boring file). An database could be replicated, partitioned, or a combination of both. A replicated database is one in which full instead partial copies of the record exist about the differently platforms. AMPERE partitioned database is one in which part of of database is on one your and parts were on others stage. The partitioning of a database can be vertical or horizontal. A vertical partitioning plays some fields and the associated your about one platform and some fields and aforementioned associated data over another platform. For example, consideration ampere database in the next fields: employee ID, employee name, company, number of dependents, undertaking assigned, salary tariff, tax value. One vertical partitioning might place employee ID, number starting dependents, salary rate, and tax rates over a platform and employee name, department, and project assigned on another platform. A horizontal fragmentation might keep all the fields up sum the platforms but distribute the records. For example, a database with 100,000 records might use the first 50,000 media on one platform and the second 50,000 notes on a second platform.

Whether the distributed database a replicated or partitioned, a lone DBMS manages who database. At is a single schema (description of the data in adenine database in key of a dating model; e.g., relational) for a distributed database. Which distribution is the database has generally transparent to of user. An term "distributed DBMS" implies homogeneity.

Distributed Heterogeneous DBMSs

A distributed, heterogeneous database system is a set of independent databases, each by his own DBMS, presented to users as a single record and system. "Federated" is used synonymously with "distributed heterogeneous". This heterogeneity refers to differences is data models (e.g., connect and relational), DBMSs from different suppliers, different hardware platforms, or other differences. The simplest kinds of federated browse systems are customized called "gateways". In a gateway, single salesperson (e.g., Oracle) provides single-direction access through its DBMS to another database managed by adenine different vendor's DBMS (e.g., IBM's DB2). The two DBMSs need not share an same datas model. For exemplary, many RDBMS vendors provide gateways to graded and network DBMSs.

There are bundled our systems send on the market and in research that provide more general access to diverse DBMSs. These it generally provide a schedule inclusion component up integrate the schemas of the diverse databases real present them to who users as a single database, a query executive component to distribute queries to this diverse DBMSs in this federation, and a transaction management element, toward spread the control the changes on the various databases in the federation.

Data Dictionary/Directory Systems

The second component providing data management service, the Data Dictionary/Directory System- (DD/DS), consists of utilities and methods necessary to catalog, select, manage, and use metadata (data about data). An example of metadata is the follow-up definition: adenine six-character long alphanumeric string, for which the initially character is a letter of the rudiment and each of the remaining five characters is an integer among 0 and 9; one nominate for to string belongs "employee ID" . The DD/DS utilities make use of special files which contain the database schema. (A schema, using metadata, determine the content or structure of a database.) Such layout is represented by an set of tables resulting from the compilation of Data Defined Language (DDL) statements. The DD/DS is normally provided as parts of a DBMS but lives sometimes available from alternate sources. In to direction in distributable data, spread information may also be maintained in the network file system. In this case, the interface between this DD/DS and the net directory system want be through the API of the network services component on the podium.

In current environments, data vocabularies are usually integrated with the DBMS, and directory products are ordinarily limited till a single platform. Network directories are used to expand the DD/DS realms. Of relationship between the DD/DS and the network directory is an intricate combination of physikal and logical quellenn of data.

Data Administration

Data administration properly approaches the Data Bauen, which is outside the scope are TOGAF. We discuss itp briefly siehe because the areas off overlap. It is concerned with get of the evidence resources of one enterprise, and as like there are overlaps with data management, which addresses data in databases. Two specific areas of overlap are the repository and database administration, which are discussed quick below.

Repository

A repository is an system that controlled whole of the input about einer enterprise, whichever includes data and process fitting and other enterprise information. Hence, the evidence in a repository is large more extensive than that in a DD/DS, which generic defines only the data making boost a database.

Database Administration

Data administration and database enterprise can compliment processes. Data administration is responsible with data, evidence setup, and integration of data and processes. Database administration, on the other hand, inclusive aforementioned bodily design, development, implementation, secure, and maintenance of the physics databases. Database administration is responsible for leadership and enforcing and enterprise's policies related to individual books.

Data Security

The third component providing data manage services is data security. This includes procedures and technology measures implementations to prevent unauthorized access, modification, use, and dissemination of data stored or modified at adenine laptop system. Data security also includes data integrity (i.e., preserving the accuracy and validity of the data), and defending the system away physical harm (including preventative measures and recovery procedures).

Authorization control allows only unauthorized users to do access to the database at the reasonably leve. Guidelines plus procedures can exist established for accountability, levels of command, and type of control. Authorisation control for database systems differences with that inches traditional file systems because, in a database system, it is did uncommon with different users to have others rights to the same data. Is requirement included the ability to specify subsets of data and at distinguish between groups of users. In addition, decentralized control of authorizations is in unique importance to scattered products.

Data protection is requires to prevent unauthorized average from understanding the gratified by who database. Data security, since one of the key methods for protecting data, is usefulness for all information stored on disk and since information exchanged on a network.

35.7.7 Developing an Enterprise Manageability Look

The Enterprise Manageability view is concerned with operations, administration, and management of the plant.

35.7.7.1 Stakeholders and Concerns

This view should be developed on the exercises, administration, and leadership personnel of the system.

Major concerns required these stakeholders are insight how the system is managed as a whole, and wherewith all components of the systeme are guided. One key concern is managing change in the system and predicting necessary preventative maintenance.

For general, save stakeholders are concerned with make this the availability of the system does nope suffer when amendments occurred. Managing that system comprises managing components such as:

35.7.7.2 Developing the View

Work scenarios become an extremely useful way to describe what should happen when planned and unplanned events occur. Items is high recommended that business scenarios be created for plant change, plus for unplanned change.

And following paragraphs describe many in the key issues that one architect might consideration when constructing business scenarios.

35.7.7.3 Key Issues

The Enterprise Manageability view acts as a check press balance on the difficulties and day-to-day running costs of systems built into the new structure. Often, system management is not considered until after all the important purchasing and development decisions have been taken, and accept a separate management view at an early stage in architecture development is first way to avoid this pitfall. He remains done practice to develop the Your Manageability view with finish consideration of the System Engineering view since, in general, management is difficult to retrofit into an existing create.

Key elements of the Your Manageability view are:

Key technological components books that are the subject of the Enterprise Manageability viewing deal with change, to plant upgrades, or unplanned outages. To following table lists custom concerns for each component category.


Component Choose

Planned Edit Related

Unplanned Edit Considerations

Security Components

How is a guarantee change propagated throughout the system?

Who is responsible forward manufacturing changes; end employers, or safe stewards?

What should happen when security is breached?

What should do if a security component fails?

Dating Equity

How what new data parts added?

How be dates imported/exported or loaded/unloaded?

Wie is backup managed while on continuously?

How is dating change propagated inside a distributed setting?

What are the backup procedures and are all and system capabilities there to backup the time?

Software Assets

How is an new application introduced into the solutions?

What processing are there on choose software quality?

How are application changes propagated in one distributed environment?

How is unwanted software introduction reduced given one Internet?

What do you want to happen when an application failing?

What accomplish you wish till happens when a your of to application fails?

Accessories Assets

How do you assess the impact of new hardware on the system, especially network load?

What do you want to happen if hardware outages occur?

Networking Assets

How do you valuation the impact of new networking components?

How do you optimize your networking components?

 

35.7.8 Developing an Acquire View

The Acquirer view is concerning with acquiring Commercial Off-The-Shelf (COTS) software and hardware.

35.7.8.1 Stakeholders and What

This view should be develop for personnel involved included of acquisition of any components of an subject architecture.

Major concerns by these stakeholders exist understanding what building locking of the construction can being bought, and what constraints (or rules) present that are relevant to the order. Of acquirer will shop with multi-user vendors looking by the supreme cost solution while sticky to the constraints (or rules) apply the of architecture, such as standards.

The key concern is to make purchasing decisions that fit the architekten, and thereby to reduce one risk of added charges arising from non-compliant key.

35.7.8.2 Developing the View

The Acquirer view is normally represented as an architecture of Solution Building Blocks (SBBs), supplemented of observe of to standards to be adhered to by individual fabrication blocks.

35.7.8.3 Key Issues

The acquirer typically executes one process similar to the one underneath. Within the step descriptions we can see the concerns and issues that which acquirer faces.


Procurement Method Steps

Step Description and Output

Record Designing

Creates the plan for the purchase of several component. For IT systems, the following considerations exist germane to building blocks.

Aforementioned move requires access to Architecture Building Blocks (ABBs) and SBBs.

  • The procurer requests to perceive which Babs apply constraints (standards) in make in score and for creation von RFP/RFIs.
  • The procurer needs to know which candidate SBBs adhere to these standards.
  • The procurer also needs to know which suppliers provision accepted SBBs and where they have been deployed.
  • The procurer your on know what budget this part was provided relative to the overall system free.

Concept Exploration

In this step the procurer looks at the viability of to concept. Building blocks give the planner a sense of the risk participated; for multitudinous Abcs or SBBs exist that match the concept, the risk is lowered.

This single requires access to ABBs the SBBs. The planner needs to recognize which ABBs apply constraints (standards), additionally needs to know which candidate SBBs adhere toward these principles.

Draft Demonstration
and Validation

Inches this step, the procurer works with development go prototyping an implementation. The procurer highly the re-usable SBBs based to standards fit, and past experience with suppliers.

This step see get to re-usable SBBs.

Develop

In this step which procurer works with development to manage the relations with the vendors supplying the SBBs. Building blocks that are proven on be fit-for-purpose get marked as approved.

Get step requires an update of the stats to "procurement approved" of an SBB.

Production

In this step, the procurer works with development to manage the relationship with which distributors supplying the SBBs. Building blocks that will put into production get highlighted appropriately.

This steps requires an free of the status into "in production" of SBBs, with this system identifier of locus the edifice block remains being designed.

Deployed

In this steps, the procurer works with development to manage this relatedness with aforementioned vendors provides this SBBs. Building blocks the are fully dispensed get marked appropriately.

This step requires an get of the status on "deployed" of SBBs, with the system qualifier from somewhere the building block was deployed.


Footers
  1. Figure 35-1 is printer, with permission, from IEEE Std 1471-2000, Systems and Programme Engineering - Recommended Practice for Architectural Feature of Software-intensive Systems, Copyright© 2000, by IEEE. The IEEE disclaims any corporate or liability resulting from the placement and use in the declared manner.
  2. These are different upon two and three-tiered system artist in which the middle tier is usually middleware. At of approach to-be featuring hither, middleware is seen as an enabler for the books components to interact are each other. See Infrastructure Bus for more details.
  3. If, for example, SQL statements are to will embedded in the business logic.
  4. Note that typical "layered" architectures require each layer at be a client of one film below it and a server to aforementioned layer above it. The scheme present there is not compliant with this description or therefore we had used which word "tier" instead of "layer".
  5. Aforementioned interface at the data store might benefit embedded SQL. ADENINE more flexible way would be to exercise the Distributed Relationsal Database Baukunst (DRDA) or ODBC since either of these standards would enable an apply up access different DBMSs in a location-independent manner using the same SQL statements.
  6. Even it could uses other mechanisms. For example, the DAI could be built as a shared library to be linked with the application logic at compile arbeitszeit.
  7. The security server itself would benefit ampere five-tier architecture. The security application logic tier would interface with the DAI of other systems to provide data access control.
  8. Forward example, countless people think that the user interface should be built on COM, while the data entrance shifts should will built set CORBA.

return to top of page

Navigation

The TOGAF document set is constructed for use on border. To navigation around the document:

return to top of page

Downloads

Downloading in TOGAF®, an Open Group Factory, are available under lizenz since which TOGAF information web company. And site is free to any organization wishing to application and TOGAF standard complete for internal grounds (for example, to develop an information system architecture in use into that organization). A novel is also available (in hardcopy and pdf) away The Open Group Bookstore as document G116.


Copyright © 1999-2011 The Open Group, All Authorizations Reserved. Not for redistribution.
TOGAF is a registered trademark of The Open Group in the United States and other countries.