IM Systems Integration and Architecture 1
IM Systems Integration and Architecture 1
IM Systems Integration and Architecture 1
Architecture 1
Compiled by:
1
Table of Contents
2
References ................................................................................................................................... 48
Assessment .................................................................................................................................. 50
Module 5: Enterprise Architecture Methods ......................................................................... 51
Overview ..................................................................................................................................... 51
Lesson Outcomes ......................................................................................................................... 51
Lesson1: Evolution of Systems Development Methodology ........................................................... 51
Lesson 2: Strategies for Enterprise Architecture Implementation ................................................... 52
Lesson 3: Enterprise Architecture Incremental Build Context ......................................................... 53
References ................................................................................................................................... 53
Assessment .................................................................................................................................. 54
Module 6: Enterprise Integration Technologies .................................................................... 55
Overview ..................................................................................................................................... 55
Lesson Outcomes ......................................................................................................................... 55
Lesson 1: Integrating Technologies................................................................................................ 55
Lesson 2: Enterprise Application Integration Concepts................................................................... 59
Lesson 3: Enterprise Portal Technologies for Integration................................................................ 61
Lesson 4: Web Services for Real-Time Integration ......................................................................... 64
Lesson 5: Service-Oriented Architecture for Integration................................................................. 65
References ................................................................................................................................... 68
Assessment .................................................................................................................................. 68
Module 7: Enterprise Resource Planning .............................................................................. 69
Overview ..................................................................................................................................... 69
Lesson Outcomes ......................................................................................................................... 69
Lesson1: Definition of Enterprise Resource Planning ..................................................................... 69
Lesson 2: ERP and Systems Integration.......................................................................................... 70
Lesson 3: ERP’s Role in Logical Integration .................................................................................... 70
Lesson 3: ERP’s Role in Physical Integration................................................................................... 71
Lesson 4: ERP implications for Management ................................................................................. 71
Lesson 5: Comparison of E-Commerce and ERP ............................................................................. 71
Lesson 6: ERP- Architecture and Components................................................................................ 72
Lesson 6: ERP Implementations .................................................................................................... 75
3
References ................................................................................................................................... 78
Assessment .................................................................................................................................. 79
Module 8: Other EA Enabling Technologies .......................................................................... 80
Overview ..................................................................................................................................... 80
Lesson Outcomes ......................................................................................................................... 80
Lesson 1: Cloud Computing .......................................................................................................... 80
Enterprise Computing .........................................................................................................................................80
Internet as a Platform .........................................................................................................................................83
Cloud computing .................................................................................................................................................87
Future of enterprise cloud computing ................................................................................................................88
References ................................................................................................................................... 93
Assessment .................................................................................................................................. 93
APPENDIX A. Course Syllabus........................................................................................................ 94
4
Module 1: Introduction to Systems Integration and Enterprise Architecture
Overview
The Role of IT in an organization is very important especially in enabling business processes. Business
capabilities of a modern organization are often determined largely by the capabilities of IT systems.
Although modern organization are facing misalignment within its different department and its external
parties due to decentralized Information Systems, poor communication within groups, inadequate
planning, incomplete requirements. This challenges creates a critical implications to meet the
organization’s business goal. To achieve this alignment, the organization should act as a single “big brain”
always making best globally and locally optimized business and IT decisions.
Systems/Enterprise integration is a progressive process; furthermore, its objectives have changed with
the increase of computerization in the society. Facing all these uncertainties and changes, business
processes have to be loosely coupled and flexible enough to be easily reconfigurable and to support the
collaboration of workers at distributed geographical locations.
Enterprise architecture is the process by which organizations standardize and organize IT infrastructure
to align with business goals. These strategies support digital transformation, IT growth and the
modernization of IT as a department.
Lesson Outcomes
o To discuss the role of IT and its importance in an Organization
o To define an Enterprise integration and explain its goals in an enterprise.
o To distinguish Enterprise Integration to System Integration,
o To elaborate the four stages of System Integration.
o To articulate the Enterprise Architecture and explain its goals, and advantages.
o To Enumerate the common Enterprise Architecture Frameworks
The role of IT in an organizations has evolved from purely technical and supporting action to a more
strategic or even business-enabling function. Information systems often become a backbone of major
organizational changes and transformations.
The capital investment in IT systems, IT budgets and infrastructure are steadily increasing over time.
Through the decades, the Information systems become more powerful, ubiquitous, diverse and
affordable. The computing power and storage capacity of IT systems are exponentially increasing. Today,
Business Applications can be deployed on dedicated servers, can be hosted in the cloud, and can run web
5
browsers and even installed on hand held devices. The relative price of IT systems are getting affordable
making it more accessible.
The purpose of IT is not only limited on installing the appropriate software and hardware in an
organization rather improving the quality of business processes that requires consistent and coordinated
changes in the three broad organizational aspects:
People
Trainings and Education to system users.
Processes
Introducing new improved business processes enabled by system
Decision Making procedures and rules.
Technology
Setting up new IT systems and required infrastructure.
Providing Technical and helpdesk support to users.
Information systems can help organization executes their business strategies and gain competitive
advantages in terms:
Each department added its own custom-built applications, built specifically for its own use, without
coordination with other functions or departments. With the passage of time, organizations accumulated
isolated computer silos, each with their specific hardware, software, access procedures, data formats, and
processing tools.
To bring some order into a chaotic situation, enterprise systems integration started as a vehicle and a
methodology to bring disparate systems together through a common front-end and mask the underlying
computer and communication infrastructure. It has evolved into a systematic redesign of the information
architecture, within enterprises and across enterprises, to ensure the flexibility and extensibility of the
Applications by design, in addition to their interoperability. Both aspects coexist in initiatives for systems
integration, even when they are not explicitly stated.
System integration is closely related to enterprise integration, which “is concerned with facilitating
information, control, and material flows across organizational boundaries by connecting all the necessary
functions and heterogeneous functional entities (information systems, devices applications, and people)
in order to improve communication, cooperation and coordination within this enterprise so that the
6
enterprise behaves as an integrated whole, therefore enhancing its overall productivity, flexibility, and
capacity for management of change (or reactivity)”. The important distinction is that the scope of system
integration may extend outside the boundary of the enterprise to cover suppliers, customers, banks, and
other parties involved in electronic commerce.
Enterprise Application Integration (EAI) was one of the first architectural concepts to bring together the
various heterogeneous applications and information systems of an enterprise. The goal was to integrate
the various platforms, tools, and applications spread across various departments and areas separated by
organizational boundaries, so that they could access the same data and communicate using a common
protocol.
It should be noted that the various integration drivers interact with each other and their effects are usually
combined. For example, both technological advances and deregulations have resulted in a worldwide
competitive environment with new patterns of collaboration and partnerships that enterprise information
systems have to contend with.
7
History
EA began in the 1960s, born from “various architectural manuscripts on Business
Systems Planning (BSP) by Professor Dewey Walker”. John Zachman, one of Walker’s
students, helped formulate those documents into the more structured format of EA.
Both men also worked for IBM during this time, and that’s when Zachman published
the framework in the IBM Systems Journal in 1987.
Modern EA strategies now extend this philosophy to the entire business, not just IT,
to ensure the business is aligned with digital transformation strategies and Figure 2 John Zachman
technological growth. EA is especially useful for large businesses going through
digital transformation, because it focuses on bringing legacy processes and
applications together to form a more seamless environment.
EA is guided by the organization’s business requirements — it helps lay out how information, business
and technology flow together. This has become a priority for businesses that are trying to keep up with
new technologies such as the cloud, IoT, machine learning and other emerging trends that will prompt
digital transformation.
“The framework successfully combines people, data and technology to show a comprehensive view of the
inter-relationships within an information technology organization,”
The process is driven by a “comprehensive picture of an entire enterprise from the perspectives of owner,
designer and builder.” Unlike other frameworks, it doesn’t include a formal documentation structure;
instead, it’s intended to offer a more holistic view of the enterprise.
A good EAP strategy considers the latest innovations in business processes, organizational structure,
information systems and technologies. It will also include standard language and best practices for
business processes, including analyzing where processes can be integrated or eliminated throughout the
8
organization. The ultimate goal of any EAP strategy is to improve the efficiency, timeliness and reliability
of business information.
EA is also used in system development, IT management and decision-making, and IT risk management to
eliminate errors, system failures and security breaches. It can also help businesses navigate complex IT
structures or to make IT more accessible to other business units.
According to CompTIA, these are the four leading Enterprise Architect Planning (EAP) methodologies:
The Open Group Architectural Framework (TOGAF): TOGAF provides principles for designing, planning,
implementing and governing enterprise IT architecture. The TOGAF framework helps businesses create a
standardized approach to EA with a common vocabulary, recommended standards, compliance methods,
suggested tools and software and a method to define best practices. The TOGAF framework is widely
popular as an enterprise architect framework, and according to The Open Group it’s been adopted by
more than 80 percent of the world’s leading enterprises.
9
The Zachman Framework for Enterprise Architecture: The Zachman framework is named after one of the
original founders of enterprise architecture and it’s another popular EA methodology. It’s better
understood as a “taxonomy,” according to CompTIA, and it spans six architectural focal points and six
primary stakeholders to help standardize and define the IT architecture components and outputs.
Federal Enterprise Architecture Framework (FEAF): FEAF was introduced in 1996 as a response to the
Clinger-Cohen act, which introduced mandates for IT effectiveness in federal agencies. It’s designed for
the U.S. government, but it can also be applied to private companies that want to use the framework.
Gartner: After acquiring The Meta Group in 2005, Gartner established best practices for EAP and adapted
them into the company’s general consulting practices. While it’s not an individual framework, CompTIA
recognizes it as a “practical” methodology that focuses on business outcomes with “few explicit steps or
components.”
These are just four of the most commonly referenced and recognized EA methodologies, but others exist.
For example, there’s the European Space Agency Architectural Framework (ESAAF), the Ministry of
Defense Architecture Framework (MODAF) and the SAP Enterprise Architecture Framework. These
frameworks are specifically targeted to individual industries or products, targeting more of a niche market
than the more generalized EA methodologies listed above.
References
DaumBerthold, MertenUdo System Architecture with XML.San Francisco, CA,Morgan Kaufmann
Publishers,2003.
FinkelsteinClive Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies.USA
,British Library Cataloguing in Publication Data,2006.
10
GautamShroff Enterprise Cloud Computing: Technology, Architecture, Applications.New York,
Cambridge University Press,2010.
GodinezMarioet al. The Art of Enterprise Information Architecture: A Systems-Based Approach for
Unclocking Business Insight.New York,IBM Press-Pearson plc,2010.
GormanMichaelM.Enterprise Architectures.
[Online]https://cdn.ttgtmedia.com/searchDataManagement/downloads/Enterprise_Architectures_Chap
ter%2004.pdf.
IEEE 1471-2000 - IEEE Recommended Practice for Architectural Description for Software-Intensive
Systems.[Online]https://standards.ieee.org/standard/1471-2000.html.
RoshenWaseem SOA- Based Enterprise Integration: A Step by Step Guide to Service-Based Application
Integration.New York,McGraw-Hill,2009.
What Is Service-Oriented Architecture?: A Look At the Nuts and Bolts of Service-Oriented Architecture.
[Online][Cited: 27 September 2020.]https://medium.com/@SoftwareDevelopmentCommunity/what-
is-service-oriented-architecture-fa894d11a7ec.
11
Assessment
Answer the following questions:
12
Module 2: Overview of Enterprise Architecture Frameworks
Overview
A Framework can be defined as a real or concept structure intended to serve as a support or guide for the
building of something that expands the structure into something useful.
In computer systems, a framework is often a layered structure indicating the kind of programs can or
should be built and how they would interrelate. The layered structure mentioned is described as a vertical
layer where at the top you want to see the most abstract and at the bottom is more of real infrastructure
hardware and components.
This Model documents the architecture-centric concepts associated with enterprise development.
Lesson Outcomes
o To explain the need of Enterprise Framework for designing and implementing an Enterprise
Information Systems.
o To develop a knowledge on how the Zachman Framework depicts entire artifact of an enterprise
architecture.
o To enumerate the Advantages and the Drawbacks of using Zachman Framework.
o To recognize another known EA framework such as TOGAF.
o To discover its Composition, Use and Benefits.
13
IEEE 14071:2000
The enterprise architecture was based from a construction or civil architecture. This has become a basis
of most software intensive systems such as information system, embedded systems and composites. And
also this is adopted by most framework of enterprise architecture.
Different Views (i.e. Business Services View) are collected by the System Architecture.
This standard provides a conceptual framework which meant to explain how the key terms relate to each
other in a conceptual model for architectural descriptions. It also tackles the role of stakeholders in the
creation of architectural description. It also provide a number of scenarios for the architectural activities
during the life cycle.
14
Lesson 2: The Zachman Framework for Enterprise Architecture
Enterprise architecture was developed by John Zachman while with IBM in the 1980 s after observing the
building and airplane construction industries and the IT industry. He saw similarities between the
construction of buildings, airplanes, and the information systems used by an enterprise.
It depicts the design artifacts that constitutes the intersection between roles in the design process which
is:
o Owner
o Designer
o Builder
These industries manage the design, construction, and maintenance of complex products by considering
the needs of different people. The figure above illustrates the owner in the building industry, who uses
architect’s drawings to decide that the building addresses specific requirements. For airplane
manufacture, the owner uses the high-level work breakdown structure of the plane to determine
requirements. For information systems, the owner uses a model of the business to determine the
enterprise needs.
The designer, however, needs a different set of diagrams: architect’s plans for the building, sets of
engineering design diagrams for the plane, or information system models for the enterprise.
The builder relies on still different types of diagrams: contractor’s plans for construction of the building, a
manufacturing engineering design for plane construction, or technology models for information systems.
15
Considering the following Abstractions:
Figure 5 Different questions (or abstractions) also need to be considered in the design and construction of buildings, airplanes,
and enterprise systems.
What is needed is important to know. This is represented in Figure above by material, such as bills of
materials for buildings and planes, and data models for information systems. How these are used is
indicated by functions, such as functional specifications for buildings and planes, and functional models
for information systems. Where is also important, as indicated by location—in drawings for building and
plane construction and in network models for information systems.
To complete the Zachman Framework for enterprise architecture, additional interrogatives added (Who,
When, and Why). Bringing these concepts together, the result is a matrix of five rows and six columns.
These represent the perspectives of the planner, the owner, the designer, the builder, and the
subcontractor, who are all interested in what, how, where, who, when, and why.
The last row addresses the functioning enterprise. The sixth row is not normally counted in the five main
rows of the Zachman framework.
16
Figure 6 The complete Zachman framework for enterprise architecture
o The large number of cells, which is an obstacle for the practical applicability of the framework.
o The relations between the different cells are not that well specified.
o Does not give a step-by-step process for creating a new architecture.
o Does not give much help in deciding if the future architecture we are creating is the best
architecture possible.
o Does not give an approach to show a need for a future architecture
17
Lesson 3: The Open TOGAF Framework
The Open Group Architecture Framework (TOGAF) is a framework with a detailed method and a set of
supporting tools - for developing an enterprise architecture. It may be used freely by any organization
wishing to develop an enterprise architecture for use within that organization.
TOGAF is developed and maintained by members of The Open Group, working within the Architecture
Forum (www.opengroup.org/architecture).
History:
The original development of TOGAF Version 1 in 1995 was based on the Technical Architecture Framework
for Information Management (TAFIM), developed by the US Department of Defense (DoD). The DoD gave
The Open Group explicit permission and encouragement to create TOGAF by building on the TAFIM, which
itself was the result of many years of development effort and many millions of dollars of US Government
investment.
Starting from this sound foundation, the members of The Open Group Architecture Forum have
developed successive versions of TOGAF and published each one on The Open Group public web site
Using TOGAF as the architecture framework will allow architectures to be developed that are consistent,
reflect the needs of stakeholders, employ best practice, and give due consideration both to current
requirements and to the likely future needs of the business.
Architecture design is a technically complex process, and the design of heterogeneous, multi-vendor
architectures is particularly complex. TOGAF plays an important role in helping to "de-mystify" and de-
risk the architecture development process. TOGAF provides a platform for adding value, and enables users
to build genuinely open systems-based solutions to address their business issues and needs.
18
Figure 7 TOGAF Structure
19
o Enterprise Continuum & Tools:
This part discusses appropriate taxonomies and tools to categorize and store the outputs
of architecture activity within an enterprise.
Benefits of TOGAF:
Any organization undertaking, or planning to undertake, the design and implementation of an enterprise
architecture for the support of mission-critical business applications will benefit from use of TOGAF.
Organizations seeking Boundary-less Information Flow can use TOGAF to define and implement the
structures and processes to enable access to integrated information within and between enterprises.
Organizations that design and implement enterprise architectures using TOGAF are assured of a design
and a procurement specification that can facilitate an open systems implementation, thus enabling the
benefits of open systems with reduced risk.
20
References
DaumBerthold, MertenUdo System Architecture with XML.San Francisco, CA,Morgan Kaufmann
Publishers,2003.
FinkelsteinClive Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies.USA
,British Library Cataloguing in Publication Data,2006.
GodinezMarioet al. The Art of Enterprise Information Architecture: A Systems-Based Approach for
Unclocking Business Insight.New York,IBM Press-Pearson plc,2010.
GormanMichaelM.Enterprise Architectures.
[Online]https://cdn.ttgtmedia.com/searchDataManagement/downloads/Enterprise_Architectures_Chap
ter%2004.pdf.
IEEE 1471-2000 - IEEE Recommended Practice for Architectural Description for Software-Intensive
Systems.[Online]https://standards.ieee.org/standard/1471-2000.html.
RoshenWaseem SOA- Based Enterprise Integration: A Step by Step Guide to Service-Based Application
Integration.New York,McGraw-Hill,2009.
21
What Is Service-Oriented Architecture?: A Look At the Nuts and Bolts of Service-Oriented Architecture.
[Online][Cited: 27 September 2020.]https://medium.com/@SoftwareDevelopmentCommunity/what-
is-service-oriented-architecture-fa894d11a7ec.
Assessment
Part 1: Read and summarize the ZACHMAN Framework for Enterprise Architecture in your own
words. Map this framework to any enterprise system and provide architecture.
Part2: Answer the following Questions:
22
Module 3: Components of Enterprise Architecture
Overview
An enterprise’s architecture is the engineering and structure of the enterprise’s mission, organizations,
functions and database domains so that they can be extended and/or integrated with other more
technical architectures such as hardware, business information systems, and business events. It describes
the contents of the enterprise’s architecture and its high level model that tells how it is created.
The enterprise architecture model comprises architectural components that serves as a key for
identification of the Resources and their Resource Life Cycles.
Lesson Outcomes
o To enumerate and explain each components of Enterprise Architecture
o To differentiate the approach of IT on development and support of Enterprise Architecture
23
Business
Architecture
Development Drives
Information
Architecture Support
Prescribes
Solutions Architecture
Supported by
Technical Architecture
It also provides a holistic view of our state government from a business perspective. It answers questions
like, Who we are?, What we do?, and Where we want to go?
It is gives a common reference model of citizens, businesses, members of General Assembly, current and
future administrations, and other interested parties that helps define the business of state of government.
The EIA framework must have three components that contain information about the enterprise’s data
assets:
24
Information Exchange and Query Points – Information generated/required by a Unit of
work and is subsequently passed to another unit of work.
o Data Description (What does the data mean?)
Structured- Organized description of data to convey semantic understanding usually
through an entity relationship diagram.
Semi Structured- Data that has characteristics of both Structured and Unstructured such
email.
Unstructured – data that is more free-form format such as unstructured text.
o Data Context (How do I find the data and access it?)
Subject Area - Broad Categories of data that supports business processes.
Information Class - Groupings of lines of business or community of interest.
ESA includes:
o Inventory Solutions, applications, and components currently used to support business functions
in an enterprise.
o Analysis of current/baseline solutions, and current technology tools supporting existing
automated solutions.
o Future-state recommendations of automated solutions and related tools.
o ESA governance and implementation requirements.
ETA domains:
o Security
o Enterprise system Management
o Information
o Database
o Applications
o Integration
o Platform
o Networking and Telecommunications.
25
References
DaumBerthold, MertenUdo System Architecture with XML.San Francisco, CA,Morgan Kaufmann
Publishers,2003.
FinkelsteinClive Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies.USA
,British Library Cataloguing in Publication Data,2006.
GodinezMarioet al. The Art of Enterprise Information Architecture: A Systems-Based Approach for
Unclocking Business Insight.New York,IBM Press-Pearson plc,2010.
GormanMichaelM.Enterprise Architectures.
[Online]https://cdn.ttgtmedia.com/searchDataManagement/downloads/Enterprise_Architectures_Chap
ter%2004.pdf.
IEEE 1471-2000 - IEEE Recommended Practice for Architectural Description for Software-Intensive
Systems.[Online]https://standards.ieee.org/standard/1471-2000.html.
RoshenWaseem SOA- Based Enterprise Integration: A Step by Step Guide to Service-Based Application
Integration.New York,McGraw-Hill,2009.
26
What Is Service-Oriented Architecture?: A Look At the Nuts and Bolts of Service-Oriented Architecture.
[Online][Cited: 27 September 2020.]https://medium.com/@SoftwareDevelopmentCommunity/what-
is-service-oriented-architecture-fa894d11a7ec.
Assessment
Answer the following:
27
Module 4: Enterprise Information Architecture Concepts
Overview
The heart of IA is information and knowledge, and we need to build on that foundation. EIA’s should better
understand their organization’s business strategy and integrate the strategic vision in order to contribute
to the development of business strategy. This can be done with a good IT governance framework.
Conceptual as well as on the Logical Layer, both represent well-defined layers describing the EIA Reference
Architecture. The architecture decisions that we then use to drill-down from the conceptual view to the
logical view. The component model of the EIA Reference Architecture is covering the relevant services
with its descriptions and interfaces to describe the functional components in terms of their roles and
responsibilities, their relationships and interactions to other components, and the required collaboration
to allow the implementation of specified deployment and customer use case scenarios. The operational-
modeling approach provides a view on how physical nodes can be derived from logical components of the
component model and related deployment scenarios. This uses of operational patterns on how
Information Services can be constructed to achieve functional and nonfunctional requirements.
Lesson Outcomes
o To examine the different data domains that is being used in the line of business of an enterprise.
o To determine the different areas IT governance that tightly coupled in business strategies and
objectives.
o To identify the different aspects of IT security and Information Privacy services.
o To acquire knowledge on Conceptual and Logical views of Enterprise Information Architecture.
o To design the Component Model of an Enterprise Information Architecture and to assemble the
corresponding Operational Model.
Certain types of data might be used enterprise-wide and others might be used only locally within a
department or a Line of Business (LOB). The data might be structured (for example, an order) or
unstructured (for example, a scanned contract document). The data might also differ from a retention
perspective indicating how long the data must be stored.
o Metadata Domain
Defined as “data about the data.” Metadata is the information that describes the
characteristics of each piece of corporate data asset and other entities.
o Master Data Domain
Refers to instances of data describing the core business entities, such as customer or
product data.
o Operational Data Domain
28
Also referred to as transactional data capturing data, which is derived from business
transactions.
o Unstructured Data Domain
Also known as content, typically managed by an enterprise content management
application.
o Analytical Data Domain
Usually derived through transformation from operational systems to address specific
requirements of decision support applications.
Standard of IT Governance
For IT Governance, many standards do exist but one common example is the COBIT standard (Control
Objectives for Information and related Technology), which is owned by the IT Governance Institute. From
the COBIT perspective, IT Governance is considered a framework to govern IT assets over their lifecycle.
Good IT Governance ensures that the IT group supports and extends the company strategies and business
objectives. The decision making process on how information systems are planned and organized, acquired
and implemented, delivered and supported, as well as monitored and evaluated. It should therefore be
just another strategic agenda item that the board addresses.
o IT principles
High-level statements about how IT will be used to create business value and a generic
information-centric set
o IT architecture
The set of technical choices that guide the enterprise in satisfying business needs.
o IT infrastructure strategies
Describes the approach to building shared and standard IT services across the enterprise
o Functional business requirements
Refers to applications that need to be acquired or built
29
o Prioritization of IT investments
The whole process of IT investments, including where they should be focused and the
procedures for progressing initiatives, their justification, approval, and accountability.
Information Governance is defined as the orchestration of people, processes, and technology to enable
an organization to leverage information as an enterprise asset. It specifically details the area associated
with managing issues such as incomplete data, poor or untimely access to data, lack of or poor Metadata,
and managing and resolving duplicate (or similar) data.
The key objectives of an Information Governance program need to first establish a culture that recognizes
the value of information as an enterprise asset. This requires real discipline and possibly the creation of
new roles within the business that didn’t exist previously (for example, Information Stewards for
information assets).
The development of effective Information Governance drives value into companies in many ways,
including:
o Compliance and regulatory adherence satisfies auditors and regulators by developing data
management environments leveraging technology and process to ensure adherence to specific
requirements.
o Enhanced BI capabilities using high-quality information drives new opportunities for organic
growth (for example, by identifying opportunities for increased effectiveness in cross-selling and
retaining existing customers)
o Enhanced alignment of IT initiatives with business strategies drives more value and enables the
business through data availability and enrichment, which enables insightful strategic planning and
execution.
o Improved platforms measure, monitor, and improve business performance by tying operational
metrics to business performance measures and facilitating reporting and management of critical
processes.
o Reduced environmental complexity improves business flexibility and accelerates strategic
initiatives by providing comprehensive and predictable information environments that support
effective business decision making.
30
Figure 11 Information Governance
o Across the globe there has been a growing number of attacks on major enterprises with (internal
inspired) threats still high.
o Business infrastructures, such as utility networks for water or electricity, are increasingly
equipped with sensors to capture information. The information is used, for example, to predict
peak consumptions.
o The Cloud Computing delivery model requires new means to federate identities across internal
and external systems to protect data from unauthorized access.
o Regulatory compliance pressures around the world across all industries demand strict
enforcement of data access and Information Privacy.
o Access by partners to internal systems is ever increasing as the new trends to distributed solutions
and cooperation across business boundaries take place.
o As systems design leads to more consolidated data sets (around core enterprise-wide DW and
MDM capabilities), the opportunity to hack one’s critical resource can actually increase.
There are many areas in which we must address Information Security in our business.
31
The following are:
Data masking is rapidly gaining prominence when dealing with data such as test databases and the
requirement to enable structurally integral data sets without exposing live data to the developers or
designers.
As defined by IBM, data masking is the process of identifying sensitive data and overlaying values that
masks the sensitive data, but does not compromise the functional integrity of an application. By enabling
data masking in the business, it seeks to manage the following issues in today’s businesses:
o Extract-Mask-Transform-Load (EMTL)
Uses an enhancement to the well-known Extract-Transform-Load (ETL) mechanism often
used with Data Warehouse environments. This is the process of extracting data from
32
production into flat files while masking the data and finally loading the data into multiple
different environments.
o In-Place Data Masking
Data is first copied from production into multiple environments and then masked in place.
For the Conceptual Layer, the EIA Reference Architecture is necessary because of its capabilities for in the
context of the architecture terms and the Enterprise Information Model. An Architecture Overview
Diagram (AOD) shows the various required capabilities in a consistent, conceptual overview for the EIA
Reference Architecture. By introducing architecture principles, we guide the further design of the EIA
Reference Architecture. We apply them to drill-down in a first step from the Conceptual to the Logical
Layer. We show the Logical View as a first graphical representation of the logical architecture and explain
key Architecture Building Blocks (ABB).
We look at information from an end user perspective working with or operating on it to achieve certain
goals. Key functional and technical capabilities provide and enable the set of operations on information
required by the user community of an enterprise. Thus, we approach the Conceptual View of the EIA
Reference Architecture presented in an AOD by introducing from a business Perspective the required
functional and technical capabilities.
The EIA must cover all five data domains with appropriate capabilities as required by each individual
domain. Furthermore, there are several capabilities required that span across either some or all data
domains. Building an EIA Reference Architecture that satisfies the more advanced business requirements
of today and the upcoming ones in the future, we see the need for the following additional capabilities:
33
feeds into the DW, the ability of complex reporting queries executing in real time within
the DW, and the ability of real time delivery of analytical insight to front-line applications.
o Business Performance Management
BPM is a capability enabling business users to:
Define the Key Performance Indicators (KPI) for the business.
Monitor and measure against the defined KPIs on an ongoing basis.
Visualize the measurements in a smart way enabling rapid decision making.
Complement the visualization with trust indices about the quality of the underlying data
putting the results in context regarding their trustworthiness.
Intelligently act if the measurement of the KPIs indicates a need to act.
Trigger events and notifications to business users if there are abnormalities in the data.
This capability often depends on strong analytical application capabilities.
o Enterprise Information Integration (EII)
Provides abilities to understand, cleanse, transform, and deliver data throughout its
lifecycle.
Data harmonization from various Operational Data sources into an enterprise-wide DW.
For cost and flexibility reasons, hiding complexity in the various, heterogeneous data
sources of new applications should not be implemented in such a way that they are tied
to specific versions of these data sources. Thus federated access must be available.
Re-use of certain data cleansing functions such as standardization services in an SOA to
achieve data consistency and improve data quality on data entry must be supported. This
requires deploy capabilities of data quality functions as services.
o Mashup
Mashup capabilities enable a business to quickly build web-based, situational applications
at low cost for typically small user groups (for example, all members of a department).
The Mashup capability must allow non-technical users to create new value and insight
from the combined information by mashing together information from various sources.
o Information Governance
o Information Security and Information Privacy
A crucial part for the design, deployment, and control processes of any instantiation of
the EIA throughout its life cycle. The Information Governance capability enables a
business to manage and govern its information as strategic assets. More specifically it:
Aligns people, processes, and technology for the implementation of an enterprise-wide
strategy to implement policies governing the creation and use of information.
Assigns Information Stewards to govern information assets throughout their life cycle.
The Information Stewards govern each information asset in the scope of defined policies,
which might be automated regarding enforcement or might require a human being
executing a task.
Assigns a balance sheet describing the value of the information and the impact of loss or
improper management from a data quality perspective.
o Cloud Computing
Cloud computing capability is necessary for many enterprises today and represents a new
delivery model for IT. However, the Cloud Computing delivery model is more than just a
34
new way of billing for IT resources. A new set of IT capabilities has been developed and
significant changes to existing IT components have been applied. Not surprisingly, the
Cloud Computing delivery model also affects the Information Management domain and
therefore the EIA within an enterprise. Thus, we briefly introduce functional and technical
capabilities relevant for the Cloud Computing delivery model
Multi-Tenancy capabilities
Self-Service capabilities
Full Automation capabilities
Virtualization capabilities
Elastic Capacity capabilities
Metering capabilities
Pricing capabilities
Billing capabilities
Monitoring capabilities
A framework characteristic of the EIA Reference Architecture represented by the AOD is its industry-
agnostic nature. Therefore, for any deployment for a company in a specific industry adaptation to
industry-specific requirements must be done. For example, if the EIA Reference Architecture is used by a
government to define the EIA for a homeland security solution, integration with external supply chain
participants might not be needed, whereas third-party data providers such as terrorist blacklists must be
integrated.
35
Figure 13 Architecture Overview Diagram for the EIA Reference Architecture
Architecture principles should enable the EIA Reference Architecture as a tool that can help you map
between the organization’s business goals, business architecture, IT landscape, and the solution delivery,
and help the Enterprise Information Architecture to be the conduit to understand the implications of
planned new business requirements.
36
o De-couple data from applications enabling the creation of trusted information which can be
shared across business processes in a timely manner.
o Strive to deploy an enterprise-wide search capability.
o Compliance with all Information Security requirements.
o Compliance with all relevant regulations and Information Privacy legislation.
o Deliver de-coupled, trusted information through Information as a Service (IaaS) so that
information services in a SOA are reusable and shareable services for the business like other
business services.
o Deploy new levels of information lifecycle management creating actionable information.
o Apply Cloud Computing delivery model to Information Services.
o Improve cost efficiency of the IT infrastructure, possibly now also using Green IT techniques.
o Deliver information with appropriate data quality.
o End-to-end inter- and cross-enterprise information integration.
o Develop an EII strategy with optimization of data transport, federation, and placement.
o Virtualize information whenever possible.
o Deliver operational reliability and serviceability to meet business SLA to ensure access to
Structured and Unstructured Data at all times.
o EIA should reduce complexity and redundancy and enable re-use.
o EIA should be based on open standards.
o Enterprise information assets must have a business owner and be part of end-to-end Information
Governance.
o Align IT solution with business.
o Maximize agility and flexibility of IT assets.
37
Figure 14 Logical View of the EIA Reference Architecture
The Component Model is the heart of the EIA. It describes the functional components in terms of their
roles and responsibilities, their relationships and interactions to other components, and the required
collaboration that enables the implementation of specified deployment and customer use case scenarios.
Each component is a relatively independent part of the architecture, where its characteristics are
described by its functions, responsibilities, usage aspects, and interfaces. Their usages depend on the
required solution capabilities and deployment scenarios.
A detailed description of each component, the main focus of the Component Model is the Component
Relationship Diagram and the Component Interaction Diagrams.
38
Component Relationship Diagram
This diagram is a depiction of the components, interfaces, and relationships that are a part of the
Component Model. The interfaces and relationships can be described at different levels. They simply
describe directional flows of data between two components. On a more ambitious level, they describe
the information content and the usage of protocols to exchange the information content between
components. We call this the static relationship between the components.
For the Component Relationship Diagram presentation, we applied the following color codes:
o The dark gray boxes represent the information services components for the metadata, data,
content, master data, and analytical data domain.
o The gray boxes represent information service-related components such as the EII Component, the
Mashup Hub Component, and IT Service & Compliance Management Services Component.
o The light gray boxes are components that are not part of the previous two categories and are
typically found in a solution based on the EIA.
39
Component Descriptions
Aside from a high-level description, it include a detailed description of the main functionalities and the
responsibilities of each component. Depending on the nature and functional scope of the component, it
also includes the service description and implementation aspects. These implementation aspects might
be characterized by various design and service patterns. The component interactions, interfacing
capabilities, and functional and non-functional requirements complete the Component Descriptions.
Those key functional components are described using the following structure (depending on concrete
project needs, a more enriched structure might be needed):
o ID
For easy identification
o Name
Applying intuitive naming convention
o High-level description
Short paragraph for quick understanding
o Service description
Focus on service, including service patterns
o Interfaces
Component interactions and interface standards (such as XML)
40
scope, an appropriate subset of the functionality of each component might be required. Any customer
use case scenario can be easily mapped to the Component Model using the corresponding Component
Interaction Diagram.
Each step in a scenario is indicated with a number. We now begin with the first scenario. Here we
assume the user (a customer) bought a consumer product (e.g. shoes, mobile phone, PDA, and so on) in
a store.
41
According to the IBM Architecture Description Standard (ADS), the Enterprise Architecture can be
presented at different levels. One of the principles that guides the development of an ADS is the
recognition that infrastructure design is a specialized skill and that its exponents deal with concepts,
entities, and methods that are different from those known in the area of application development. The
EIA Reference Architecture is subdivided into three parts: a Conceptual Level, a Logical Level, and a
Physical Level
o Hardware and software technology and product selection for computers and networks
o Hardware specifications, such as processor speed and disk configuration, or network bandwidth
and latency
o Overall hardware configurations, such as “fail-over” or “scalable” arrangements
o Software product specifications (such as version) and detailed configuration, such as the need for
multiple instances of a software product (operating system, middleware, and communication
element or application system) on a computer
42
o Deployment units (DU)
Items placed on the nodes.
It is the smallest unit of software or data for which an architect makes a placement
decision. Deployment units are shown as named items on each node. A deployment unit
consists of one or more components.
o Execution deployment units (EDU)
It represents the installation and execution of components.
o Locations
Group of nodes.
It is a geographical entity (such as a zone or building type) and is shown by pictorial
elements around one or more nodes.
43
However, the generalized Operational Model allows to select, customize, and integrate pre-developed
architectural patterns for our needs. For this reason, a collection of predefined node types, connection
types, location types, and DU placements is provided. Furthermore, relevant IT service management node
types, specified technical components, and topology patterns are selected carefully. Inter-location border
types and interrelationships of specified nodes for the most common distribution scenarios of logical
components are also provided.
With these operational design techniques, we can maximize the reuse of robust solution outlines by
selectable architectural patterns in the context of the EIA Reference Architecture. For operational
modeling purposes, it is important to understand that NFRs can be derived from affected data domains
such as Operational or Analytical Data.
o Corporate WAN
Corporate wide area network
o Branch LAN
Internal local area network (LAN within a branch)
o Head Office LAN
Internal local area network (within head office)
o Internet Link
Internet link and access to the external business partner’s organization
44
Access Mechanisms
In order to describe how the component model is implemented across IT systems, the Operational
Model documents the access mechanisms used by all users of the system. In operational terms, people
(and systems) can use and access the system components in a variety of access mechanisms according
to the defined use cases. Well-known standard access mechanisms include:
o Information Services
o Application Platform Layer for Information Services
o Technology Layer for Information Services.
o IT Service & Compliance Management Services.
45
Figure 19 Standard node types and their categorization in layers
46
Framework of Operational Patterns
The framework of operational patterns is a repository of recurring solution elements based from previous
experiences. It is a good practice to capture and reuse the experience of past engagements. The lessons
learned applying Information Services, you can consider the “scope of integration” which is determined
by typical deployment scenarios of these services. The scope of integration impacts the requirements for
availability, resiliency, security, and, to a certain extent, scalability. The scope of integration can be
categorized in three ways:
47
Redundancy is a critical and well understood means of achieving high availability. This
includes redundant components, redundant systems, and redundant data. Hardware
components can fail, and software quality varies from release to release, making other
techniques for high availability equally important.
o Content Resource Manager Service Availability Pattern
Contributes to availability by segregating functions and can enable increased redundancy,
increased scalability, and simplified management among components
o Federated Metadata Pattern
Communicates with and retrieve data from remote data sources through wrapper
services
o Mashup Runtime and Security Pattern
o Compliance and Dependency Management for Operational Risk Pattern
It addresses formal and documented dependency and configuration management
procedures, inter-relationships of information resources, and the impact of a single-
configuration change on business applications and infrastructure services.
o Retention Management Pattern
It is about retaining corporate records for the minimum appropriate retention period to
meet business and regulatory requirements (laws, policies, and regulations on the
business).
o Encryption and Data Protection Pattern
Provides greater data security, integrity, retention, auditability, and privacy.
o File System Virtualization Pattern
File virtualization approach is through the use of a Distributed File System Services
Clustered Node such as IBM General Parallel File System (GPFS).
o Storage Pool Virtualization Pattern
It addresses the increasing cost and complexity in data storage management by shifting
storage management intelligence from individual SAN disk subsystem controllers into the
network through a virtualization cluster of nodes.
o Automated Capacity and Provisioning Management Pattern
It has the ability to control lifecycle, starting, stopping, and provisioning of services
automatically.
References
48
FinkelsteinClive Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies.USA
,British Library Cataloguing in Publication Data,2006.
GodinezMarioet al. The Art of Enterprise Information Architecture: A Systems-Based Approach for
Unclocking Business Insight.New York,IBM Press-Pearson plc,2010.
GormanMichaelM.Enterprise Architectures.
[Online]https://cdn.ttgtmedia.com/searchDataManagement/downloads/Enterprise_Architectures_Chap
ter%2004.pdf.
IEEE 1471-2000 - IEEE Recommended Practice for Architectural Description for Software-Intensive
Systems.[Online]https://standards.ieee.org/standard/1471-2000.html.
RoshenWaseem SOA- Based Enterprise Integration: A Step by Step Guide to Service-Based Application
Integration.New York,McGraw-Hill,2009.
What Is Service-Oriented Architecture?: A Look At the Nuts and Bolts of Service-Oriented Architecture.
[Online][Cited: 27 September 2020.]https://medium.com/@SoftwareDevelopmentCommunity/what-
is-service-oriented-architecture-fa894d11a7ec.
49
Assessment
Answer the following questions:
1. How the different data domains can manage successful enterprise though a coherent Information
Governance framework?
2. What is a Component Interaction Diagram? How does it demonstrated the viability of the
component model?
3. What are the introduced operational patterns that enable the architect to improve the reuse of
the implementation design of Information Services?
50
Module 5: Enterprise Architecture Methods
Overview
There are various methods for implementing enterprise architecture. The emphasis of these methods is
to identify priority data, business activities, and business processes, and then deliver these priority areas
in 3-month increments as production systems.
Strategic modelling that identifies the reusable business activities and business processes from data
models. This is a key method that is used to derive project plans manually or automatically from data
models. This method enables high priority business subprojects to be identified for delivery in 3-month
increments.
It is also an important step in enterprise architecture is strategic alignment: so that data as well as
processes, locations, people, events and business plans all support each other.
Lesson Outcomes
o To review the evolution of systems development methodologies.
o To identify the different strategies for enterprise architecture implementations
o To plan EA based on Incremental Build Context
With software engineering, each DFD that was defined for a process identified the data that it needed as
data stores. Each different version of the same process often resulted in redundant data store versions
implemented for each automated process, moving us to data maintenance chaos!
In this same period—from the late 1960s through the early 1970s—Edgar Codd, a research fellow at IBM
San Jose Labs, developed the relational model from mathematical set theory. This was the foundation of
the relational database technology that we still use today. The first relational database management
51
systems (RDBMSs) were released by IBM Corporation (IBM DB2 RDBMS) and by Oracle Corporation
(Oracle RDBMS) in the late 1970s and early 1980s.
From the mid-1970s, three approaches emerged, as discussed next, to apply concepts of the relational
model to the methods that were used for database design. The first approach was from the United
Kingdom and Europe, the second approach was from the United States, and the third approach was
business driven and emerged independently in Australia. Each addressed the development of data
modeling methods, using normalization to eliminate redundant data versions.
The business-driven approach evolved into integrated methods for information, using a rigorous
engineering discipline, called information engineering (IE). Originally developed by Clive Finkelstein, IE
was popularized worldwide through-out the 1980s by James Martin. Further books showed the use of
business-driven information engineering. This evolved into what is today called enterprise engineering
(EE).
52
architecture. The most appropriate enterprise architecture implementation approach can
be selected.
o Strategy C: Deliver progressively in 3-month incremental builds.
This approach leads to incremental implementation of priority areas that are needed first,
before other areas that can wait until later. This approach enables strategic business plans
for the future to be defined using the strategy analysis methodology of enterprise
engineering. The business plans are used to identify data and information that are
required for the future. This is documented in a strategic model, which is a high-level
enterprise model that achieves enterprise-wide data integration.
o Step 1: Strategy analysis identified statements for mission, vision, core values, goals, objectives,
issues, KPIs, and strategies in the strategic plan.
o Step 2: Strategy analysis identified from the organizational structure those managers and business
experts responsible for implementing priority areas of the strategic plan.
o Step 3: With participation by the identified managers and business experts, over 5 days in a
business planning workshop they optionally apply the strategy analysis methodology to define
tactical business planning statements to implement strategic plans.
o Step 4: Data mapping is used to enable business experts and IT experts to work together to
identify data for integration. This begins with a 2-day strategic modeling facilitated session.
Entities that represent required information and data are listed.
o Step 5: The facilitated modeling session continues over 2 days, documenting key entities in a
strategic model on a whiteboard. The strategic data map is a high-level enterprise model.
References
FinkelsteinClive Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies.USA
,British Library Cataloguing in Publication Data,2006.
53
Assessment
Answer the following questions:
1. What is the significance of Object Oriented development and Unified modeling language in the
development process?
2. What is the contribution of Zachman Framework in drafting the strategies of Enterprise
Architecture?
3. Explain the meaning of Strategic Modelling and Strategic data map?
54
Module 6: Enterprise Integration Technologies
Overview
This module will cover the technologies and vendor products that can be used to deliver into production
the priority databases, activities, and processes identified in EA Methods.
It also introduces the concepts and technologies used by enterprise portals and discusses their use for
rapid delivery of priority information and content resources in enterprise integration projects.
Web services concepts and technologies are introduced in this module, along with the evolution of Web
services. It describes the technical foundations of Web services that are used for enterprise integration in
this part. It discusses their use in enterprise portals with Web services for remote portals.
The technologies used by SOA and BPM languages will be discussed. Four BPM languages are described:
Business Process Execution Language for Web Services (BPEL); Web Services Choreography Interface
(WSCI); Business Process Modeling Language (BPML); and Business Process Specification Schema (BPSS)
for ebXML. These offer the potential to transform systems development in twenty-first-century
enterprises, with XML-based BPM languages automatically generated as executable code directly from
workflow models or process models.
Lesson Outcomes
o To discuss the different Integrating Technologies used in an Enterprise Architecture.
o To describe the Direct to Point-to-Point, and Middleware approach in Integrations.
o To explain the concept of XML in enterprise application integration.
o To discuss the usage of Enterprise Portal in Enterprise Integration.
o To identify the different Web Service Technologies for Real Time Integration.
o To define Service-Oriented Architecture and its services for Integration.
Stovepipe systems held independent data; it was recognized that customer information and the sharing
of this information across departments was extremely valuable to an enterprise. Allowing the disparate
systems to interoperate become increasingly important and necessary. As an organization grew, its desire
to integrate key systems with client and vendors are essential.
55
The idea and implementing application integration is not new. What is new are the approach and ideas
that Enterprise Application Integration (EAI) encompasses and techniques that can be utilized. The Success
of applying EAI requires involvement of the entire Enterprise.
This involves:
o Business Processes
The key is to combine tasks, procedures, required input and output information and tools
needed in each stage of the process. It is imperative, than an enterprise identifies all
processes that contribute to the exchange of data within the organization. This allows
organizations to streamline operations, reduce costs and improve responsive to customer
demands.
o Application
Merging of one application data /functionality to another application.
o Data and Standard
This addresses the need to have a global standard by which data can be shared and
distributed across an enterprise’s network of systems. In order to achieve this, all data
and its location must be specified, recorded and a metadata model built. Without this
format, Business Processes and Application integrations will not be viable.
o Platforms.
This provides a secure and reliable means for corporation’s heterogeneous systems to
communicate and transfer data from one application to another without running into
problems.
o Direct Point-to-Point
o Middleware-based integrations.
Middleware Integrations
To solve the issue of high amounts of integration points and thereby relieving the coupling problem, the
use of middleware has been introduced where the number of integrations points will be equal to the
number of systems.
56
A middleware is an intermediate layer provides generic interfaces through which the integrated systems
are able to communicate. It perform tasks such as routing and data passing. Each of the interfaces-defines
a business process provided by a certain application. Adding and replacing applications will not affect
another application. Middleware is a technology that allows us to move information between enterprises.
Synchronous middleware is tightly coupled to applications. The applications are dependent on the
middleware to process one or more functions calls at a remote application. Calling application must halt
processing to wait for the remote application to respond.
Types of Middleware
o RPC
Oldest type of middleware. Provide ability to invoke a function within one program and
have that function execute within another program on a remote machine. RPC are
synchronous so RPC must stop the execution of the program. They also require more
bandwidth than other types of middleware.
Advantage of RPC is its simplicity for mechanism and programming. Disadvantage is are
its huge performance cost and inability to scale.
o Message-oriented middleware (MOM)
57
MOM is queuing software that uses is messages as a mechanism to move information
from point to point. MOM uses the notion of messages to communicate between
applications, Direct coupling with the middleware mechanism and the application is not
required. MOM rely on asynchronous paradigm. This allows application to function
independently such as continue processing after making a middleware service request.
Message is dispatched to a queue message, which ascertains that message is delivered to
its final destination. Messages returning to the calling application are handled when the
calling application finds the time. Managing are easy to manage using MOM as it has
structure (schema) and content (data). MOM can be thought as one-record database that
move between applications through message-passing mechanisms. MOM supports two
communication models; Point-to-point, and Message queuing (MQ).
o Distributed objects
Small application programs that use standard interfaces and protocols to communicate
with one another. Provide mechanisms for application development, providing enabling
technology for enterprise, or enterprise-wide method sharing. There are two types of
distributed objects in market today; Common Object Request Broker Architecture
(CORBA) and Component Object Model (COM).
o Database-oriented middleware
Facilitates communication with a database, whether from an application or between
databases. Can be used as mechanism to extract information to extract from either local
or remote databases. Works with two basic database types; the first one is Call-level
interfaces (CLI) - Common APIs that span several types of databases, providing access to
any number of databases through a well-defined common interface such as Open
Database Connectivity (ODBC).The second one is Native database middleware.
o Transactional middleware
Provides mechanism for coordination information movement and method sharing
between many different resources. – Provides tightly coupled integration that requires
changes with source and target applications. Based on concept of transaction a unit of
work with a beginning and an end and application logic is encapsulated within a
transaction that either completes or is rolled back completely.
TP monitors
Provide mechanism to facilitate the communication between two or more
applications as well as a location for application logic. Provides scalability by
sharing and processing transactions among other connected TP monitors. Provide
connectors to databases, other applications and queues. Once connected these
resources are integrated into the transaction and leveraged as part of the
58
transaction. TP monitors greatest performance value is in their load-balancing
feature.
Application servers
Provide application logic sharing and processing and for connections to back-end
resources such as databases, ERP applications and even traditional mainframe
applications. It also provide user interface mechanisms to deploy applications to
the web platform
o Integration servers
Facilitates information movement between two or more resources and can account for
differences in application semantics and platforms without any application necessarily
understand anything about other applications it shares information with. It can also join
many applications by using common rules and routing engines and transform the schema
and content of the information as it flows between various applications and databases. It
can broker messages between two or more source or target systems.
XML
o Stands for Extensible Markup Language.
o A Markup language that defines set of rules for encoding documents in a format that is both
human-readable and machine-readable.
o It is normally used in website frontends, SW frontends, developing, and backend API
development.
o The most API responses are JSON and XML.
o Extension file is .xml
o Internet Media Type are application-xml or text-xml.
XML Usage
o KEEP – it can keep data separated from your HTML.
o STORE – it can store data inside HTML documents.
59
o FORMAT – it can be used as a format to exchange information.
o STORE IN DATABASE – it can be used to store data in files or in database.
<Customer>ABC Inc.</Customer>
But the Credit Control and Finance Departments use different terminology. They only recognize ABC by
their relevant terms:
The start and end tags clearly indicate the terminology that is used in each department. We can see from
these XML data fragments that each department is dealing with the same enterprise: ABC.
Supposed a purchase order (PO) that is exchanged between both companies. This PO is issued by Smith
and Co, a subsidiary of ABC. It is a PO expressed in XML. It will look like this:
XML is also used to model Enterprise architectures using XML enterprise framework.
60
Enterprise Information Integration requires an accurate, precise, and complete understanding of the
disparate data sources, the needs of the information consumers, and how these map to the business
concepts of the enterprise. In practice, such integration takes place in context of any enterprise
information system. Approaches to EII, its architecture as well as its association to enterprise application
integration. We justify why XML technology contributes to finding sufficiently powerful support for EII.
We present some features of XML technology, mainly its database part, and show how it is usable to EII.
61
A key characteristic of enterprise portals is support of a single sign-on function: enabling qualified users
to sign on once to the portal and be automatically signed on to each application or resource that they are
authorized to access for relevant sites in the enterprise network.
62
Integration Using Enterprise Portal
An enterprise portal appears to deliver integration across many data sources presented in the separate
windows. But this is deceptive; each window is typically independent of all other network.
An enterprise portal that provides a view to one of these redundant versions sees only those values for
the relevant version. Hopefully these are up to date. But if they are out of date, that version must be
synchronized with more recently updated versions that exist elsewhere in the enterprise.
A portal presents an appearance of integration. It supports presentation integration. But the underlying
data themselves must first be integrated. Access through a portal to non-integrated, out-of-sync data is
irresponsible and is the ultimate exercise in futility.
Collaborative portals generally focus on unstructured knowledge resources, and typically offer
access to Microsoft Exchange and Lotus Notes. Examples of such resources are documents,
reports, e-mail, graphics, images, audio, and video. Collaborative portal products include the
following:
Business intelligence portals generally focus on structured knowledge resources, with access to
data warehouses and information system databases. These structured resources are accessed via
business intelligence (BI), online analytical processing (OLAP), and other tools. Most data
warehouse products are evolving into this BI portal category. Some representative BI portal
products include:
63
Integration portals focus on easy integration between structured and unstructured knowledge
resources existing in information systems and data warehouse databases, ERP environments,
CRM, SCM, and others—within an enterprise via the corporate intranet, or between enterprises
via the Internet. A popular integration portal product is SAP Enterprise Portal from SAP.
It is a server running on a computer device, listening for requests at a particular port over a network,
serving web documents (HTML, JSON, XML, and images) and creating web applications services, which
serve in solving specific domain problems over the WWW.
SOAP
An XML based Web service protocol to exchange data and documents over HTTP or SMTP (Simple Mail
Transfer Protocol). It allows independent processes operating in disparate systems to communicate
using XML.
REST
Provides communication and connectivity between devices and the internet API-based tasks. Most
RESTful services use HTTP as supporting protocol.
64
Lesson 5: Service-Oriented Architecture for Integration
Service-Oriented Architecture (SOA) is a style of software design where services are provided to the other
components, through a communication protocol over network. Its principles are independent of vendors
and other technologies. It is basically a collection of services. The communication can involve either simple
data passing or it could involve two or more services coordinating some activity. It is an evolution of
distributed computing based on the request/reply design paradigm for synchronous and asynchronous
applications. For example, a service can be implemented in.NET or J2EE, and the application consuming
the service can be on a different platform or language.
SOA is an architectural approach, in which applications make use of services available in network. In this
architecture, services are provided to form applications, through a communication channel over the
internet.
Security
Data
confidentiality
and integrity
Process
Services
Align IT with
Improved
Information Flow Business
Operations
SOA
Service-
Oriented
Architecture
Platform Practice
Increase Employ Best
Operational Practices
Efficiency
Methodology
Adaptability
Ability to Adapt
quiclkly to different
external
environment
o Service Provider
o A role that works in conjunction with the service registry, debating the whys and how’s of
the services being offered, such as security, availability, what to charge, and more. This
role also determines the service category and if there need to be any trading agreements.
o It is the maintainer of service and the organization that makes available one or more
services for others to use.
o Service Broker
o This role makes information regarding the service available to those requesting it. The
scope of the broker is determined by whoever implements it.
65
o Service Requester/Consumer
o It locates entries in the broker registry and then binds them to the service provider. They
may or may not be able to access multiple services; that depends on the capability of the
service requester.
Advantages of SOA
o Service Reusability
Applications are made from existing services.
Service can be reuse to make many applications.
o Easy Maintenance
As services are independent of each other they can be updated and modifies easily
without affecting other services.
o Availability
SOA facilities are easily available to anyone on request.
o Reliability
SOA applications are more reliable since it is easy to debug small services rather than huge
code.
Disadvantages of SOA
o High Overhead
66
A validation of input parameters of services is done whenever services interact this
decreases performance as it increases load and response time.
o High Investment
o Complex Service Management
When services interacts they exchange messages to tasks. The number of messages may
go to millions. It becomes a cumbersome task to handle a large number of messages.
Event-driven architecture is an approach for designing and building applications where business events
trigger messages to be sent between independent services that are completely unaware of each other.
An event may be the receipt by the enterprise of a sales order transaction from a customer for processing.
An event may also be a change in a data value that requires a purchase order to be placed with a supplier,
when the available quantity of a product in the warehouse falls below a minimum balance threshold.
The following are the Business Process Management (BPM) languages of SOA:
67
conjunction with the ebXML CPP and CPA. It also defines the automatic generation of
BPSS code from UML diagrams. BPSS 2.0 uses BPMN instead of UML for process models.
o Business Process Modeling Notation (BPMN)
Business Process Modeling Notation is emerging as a way to specify business process
models and diagrams. This is as an evolving standard for the specification of process logic
for all of the above BPM languages. The Business Process Management Initiative (BPMI)
and the Open Management Group (OMG) have announced they are merging their BPM
activities to advance the use of BPMN as an open standard.
References
FinkelsteinClive Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies.USA
,British Library Cataloguing in Publication Data,2006.
RoshenWaseem SOA- Based Enterprise Integration: A Step by Step Guide to Service-Based Application
Integration.New York,McGraw-Hill,2009.
What Is Service-Oriented Architecture?: A Look At the Nuts and Bolts of Service-Oriented Architecture.
[Online][Cited: 27 September 2020.]https://medium.com/@SoftwareDevelopmentCommunity/what-
is-service-oriented-architecture-fa894d11a7ec.
Assessment
Answer the following questions:
68
Module 7: Enterprise Resource Planning
Overview
The Enterprise resource planning (ERP) software market is one of the fastest growing markets in the
software industry. It has seen a rocky start with several project failures and a huge shortage of skilled and
experienced workers. The application such as Enterprise Resource planning aims at integrating enterprise
systems across functional departments. It is an integrated computer-based application software used to
manage internal and external resources.
It interfaces with all aspects of an organization: people, process, technology, systems, structure, skills,
culture, and definitely available technology funds. Executives responsible for such projects must develop
a very clear understanding of the tasks they are about to undertake and ensure that all the relevant
variables are accounted for in the planning process and that time and effort are dedicated to them during
and after the implementation.
Lesson Outcomes
o To discuss the role of Enterprise Planning to Physical and Logical Integrations.
o To assess the implications of ERP to Management.
o To distinguish ERP to E- Commerce.
o To identify the components of ERP and its Architecture.
o To discuss the ERP Implementations and Pros and cons in Business Level.
o To give examples of ERP Vendors.
The goal of ERP is to integrate departments and functions across an organization into a single
infrastructure sharing a common database and serving the needs of each department.
ERP systems replace an assortment of systems that typically existed in organizations. Moreover, ERP
solves critical problem of integrating information from different sources and makes it available in real-
time.
69
Figure 24 Integrated Systems - ERP
ERP systems are the first generation of enterprise systems meant to integrate data and support all the
major functions of ERP systems integrate various functional aspects of the organization as well as systems
within the organization of its partners and suppliers.
The goal of an ERP system is to make the information flow dynamic and immediate, therefore, increasing
its usefulness and value.
An ERP system implements best practices via specific built-in steps for processing a customer order in
terms of:
70
o Order entry.
o Routing through departments.
o Communication of output to various parties.
A good ERP implementation improves operational efficiency with better business processes that focuses
on organizational goals rather than on individual departmental goals. Improved efficiency with a paperless
flow and electronic data interchange (EDI) or business-to-business (B2B) commerce environment with
partner
ERP
o Focuses on integrating the internal functional silos of the organization into an enterprise
application.
o Adaptive technology
Merged the early data processing and integration efforts within an organization.
71
Figure 25 Venn Diagram of E-Commerce and ERP Approach
o Hardware
Servers and peripherals
o Software
Process Operating systems and database
o Information
Organizational data from internal and external sources
o Process
Business processes, procedures, and policies
o People
End users and IT staff
72
ERP Architecture
The architecture of an ERP system influences the cost, maintenance, and the use of the system. The ERP
architecture helps the implementation team build the ERP system for the organization. If purchased,
ERP architecture is often driven by the vendor (Package-Driven Architecture).
o Logical Architecture
Focuses on the supporting needs of the end users.
73
Figure 28 Example of Tiered Logical Architecture of ERP Systems
o Physical Architecture
Focuses on the efficiency of the system.
74
Business Level
Benefits Limitations
Agility of the organization in terms of responding Retraining of all employees with the new system
to changes in environment for growth and can be costly and time consuming.
maintaining
market share
Sharing of information across functional areas Change of business roles and department
helps collaboration between employees boundaries can create upheaval and resistance to
the new system.
Linking and exchanging information in real-time
with supply-chain partners improves efficiency
leading to lower costs.
Better customer service due to quicker
information flow across departments.
Efficiency of business processes are enhanced
due to the re-engineering of business processes.
75
Figure 29 ERP Implementation
Vendor Evaluation
The following are consideration in evaluating potential vendor:
76
Considerations on Operations and Post-Implementation
Going live (“Go-live”) is one of the most critical points in a project’s success. It is vital to focus the efforts
of all project teams to ensure that task and activities are completed before going live.
o Project Management
For an ERP system to be implemented successfully, project management must provide
strong leadership, a clear and understood implementation plan, and close monitoring of
the budget.
o Consultants
It is often the case for organizations without much ERP implementation experience to use
implementation partners such as consultants.
o Change Management
Role is essential because it prepares for changes to how business is done. In implementing
new systems, communicating, preparing, and setting expectations is as important as
providing training and support.
o Business Process Re-engineering
Business processes will need to be changed, adjusted, or adapted to the new system to
use the functionality of an ERP system fully.
o Global, Ethical and Security Management
Outsourcing overseas, ethical issues, and problems with system security have also
attracted a lot of attention in ERP implementation.
77
o Infor
The world’s third largest provider of enterprise software. It delivers integrated
enterprise solutions in supply chain, customer relationship and suppliers management.
o Lawson
Industry-tailored software solutions that include enterprise performance management,
distribution, financials, human resources, procurement, and retail operations.
References
Lawson Website.[Online]www.lawson.com.
Oracle Website.[Online]www.oracle.com.
SAP Website.[Online]www.sap.com.
78
Assessment
Answer the following questions:
79
Module 8: Other EA Enabling Technologies
Overview
There are different technologies that enables the Enterprise Architecture Integration nowadays and one
of these is Cloud Computing. The role of information in Cloud Computing as a new delivery model and
information delivery in a WWW rounds off key aspects of the EIA. It provides capabilities to further
facilitate both the breadth and depth of capabilities required for a true Enterprise Information
Architecture. The Cloud Computing capability is necessary for many enterprises today and represents a
new delivery model for IT. However, the Cloud Computing delivery model is more than just a new way of
billing for IT resources. A new set of IT capabilities has been developed and significant changes to existing
IT components have been applied.
Another technologies that provides as a motivation to the enterprise's operation is Business Intelligence.
Under Business Intelligence are concepts of Data Warehousing, Data Mining, OLTP and OLAP.
Lesson Outcomes
o To discuss how internet becomes a service for Information Systems.
o To explain the role of Cloud Computing in IT and Business Enterprise.
o To discuss the common cloud models of cloud providers.
o To explore the future of enterprise cloud computing.
o To determine the different approaches that Business Intelligence can offer in an enterprise.
o To discuss the Data Warehousing Process
o To illustrate some text and Data mining approaches in BI.
o To distinguish the OLAP and OLTP Processing tool.
Enterprise Computing
Enterprise computing means the use of computers for data processing in large organizations, also referred
to as ‘information systems’ (IS), or even ‘information technology’ (IT) in general. The use of computers for
enterprise data processing began in the 60s with the early mainframe computers. Over the years
enterprise computing paradigms have changed dramatically with the emergence of new technology.
With each of these advances, enterprise systems have dramatically improved in terms of scale and
ubiquity of access. At the same time their complexity, and consequently cost, has increased as well.
Now, cloud computing offers the potential for revolutionizing enterprise computing once more, this time
by transforming computing itself into a utility that can be accessed over the internet.
80
Mainframe Architecture
The history of enterprise computing began in the advent of ‘3rd generation’ computers in the 60s; these
used integrated circuits as opposed to vacuum tubes, beginning with the IBM System/360 ‘mainframe’
computer and its successors, which continue to be used to date, e.g. the IBM z-series range.
Client-Server Architecture
The microprocessor revolution of the 80s brought PCs to business desktops as well as homes. At the same
time minicomputers such as the VAX family and RISC-based systems running the UNIX operating system
and supporting the C programming language became available. It was now conceivable to move some
data processing tasks away from expensive mainframes to exploit the seemingly powerful and inexpensive
desktop CPUs. As an added benefit corporate data became available on the same desktop computers that
were beginning to be used for word processing and spreadsheet applications using emerging PC-based
office-productivity tools.
81
Figure 32 Client-Server Architecture
In late 90s, RISC CPUs had exceeded mainframes in raw processing power. However, unlike the
mainframe, client-server architectures had no virtual machine layer or job control systems to control
access to limited resources such as CPU and disk.
Client-server architectures fail to scale for high volume transaction processing because the CPUs were
inferior to mainframes.
82
Figure 33 3-tier TP monitor architecture
Internet as a Platform
The internet was born as a communication infrastructure for data sharing soon grew to include academic
institutions across the world. Using a browser, information ‘published’ over the internet could be accessed
anonymously by the public at large, giving rise to the ‘world wide web’. The subsequent history of the
commercialization of the web and the dot-com boom is also well known. The internet also evolved into a
platform for enterprise applications, eventually giving birth to the cloud computing paradigm.
83
Figure 34 Internet technology and web-enabled applications
In a web-enabled application architecture, processing logic, including database access, took place outside
the web server process via scripts or programs invoked by it, using CGI for inter-process communication.
Each such ‘CGI-script’ invocation included the costly overhead of launching the required server program
as a fresh operating-system process.
84
Figure 35 Web application server
The invention and proliferation of the Java language, designed to be portable across machine
architectures with its interpreted yet efficient execution model made possible alternative approaches to
execute application functionality inside the web-server process, leading to the birth of the ‘application
server’ architecture.
Through the 2000s, the application server architecture has become pervasive across enterprise IT,
virtually replacing all other alternatives for new application development. The only major choice to be
made has been between a Java or Microsoft stack.
85
INTERNET OF SERVICES
Once applications began to be web-enabled, it became natural to open up access to some of their
functionality to the general public. For example, web-based access to back-end applications meant that
end-users could themselves perform tasks such as tracking courier shipments, getting quotations for
services, or viewing their bank balances; soon secure payment mechanisms were also developed that
enabled users to place orders and make payments online.
With web-based access to applications becoming uniformly available to users through a browser
interface, the next step was programmatic access to the same applications over the internet. This was
open to abuse and malicious behavior (denial of service attacks etc.). Web services were developed
initially to address this need.
The W3C defines a ‘web service’ as interoperable machine-to-machine interaction over HTTP. The HTML
format for data exchange over the internet, was used extensively in the mainframe world for generating
reports. While hugely successfully, HTML was less suited for machine-to-machine communications as its
syntax is not ‘well-formed. In 1997 W3C published XML (extensible markup language), using which one
could also write well-formed HTML (XHTML), thereby driving browsers to support XML in addition to
HTML.
This, together with XML as a basis for interoperable message formats, laid the foundation for formal web
service standards. The XML-RPC standard mimics remote procedure calls over HTTP with data being
transferred in XML. Like RPC, XML-RPC limits itself to simple data types, such as integers, strings etc. To
support complex, nested (object oriented) types, the SOAP protocol was developed, whereby the schema
of the messages exchanged as input and output parameters of published ‘services’ was defined using an
XML format called WSDL (web services description language) and communicated over HTTP as SOAP
messages (another XML format). Using SOAP, applications could call the web services published by other
applications over the internet.
86
Figure 37 Internet of services
An alternative to the SOAP protocol, called REST (representational state transfer), which is rapidly
emerging as preferred protocol for remote data access especially in the context of cloud computing.
Cloud computing
Whereas software as a service is about packaged applications made available over the internet, cloud
computing makes a lower level of infrastructure and tools available over the internet in data centers
maintained by a cloud provider. To understand the additional features that account for the surge of
interest in cloud computing, we first need to trace the evolution of cloud computing by the pioneers in
the field. Amazon and Google.
Amazon, the first ‘cloud’ provider, faced a different set of challenges as it grew from an online bookseller
to an online retail hub, but solved them in a highly innovative and reusable manner, leading eventually to
a new cloud computing business. First, the complexity of Amazon’s application suite; to display one page
featuring a book, a number of services from fairly complex applications are needed, such as reviews,
recommender systems, and collaborative filtering. Next, the peaks and troughs of the seasonal retail
business necessitated Amazon to continuously monitor load and automatically provision additional
capacity on demand. Finally, as they became a retailer catering to the ‘long tail’ of small niche products,
they saw the need to support their suppliers with some minimal IT, many of whom had no systematic
computing systems apart from a few personal computers.
For Google, the scale of computing power needed to support large-scale indexing of the web, the immense
volume of searches, and machine-learning-based targeting of advertisements across this volume meant
87
orders of magnitude larger computational needs as compared to even the largest enterprise. Large banks
today often have tens of thousands of servers; Google, on the other hand is estimated as running over a
million servers, as of today. Google developed innovations in programming models for large-scale
distributed processing, such as the Map Reduce model for partitioning a sequence of tasks to be
performed on a very large data set and executing it in parallel across a very large set of machines.
Cloud models
88
Lesson 2: Business Intelligence, Analytics and Search
Another equally important motivation to maintain data about an enterprise’s operations is to unearth
hidden patterns and discover knowledge that can improve business strategy or optimize operational
processes. Such knowledge discovery tasks are supported by analytical applications. Additionally, with the
advent of the web and the ubiquity of internet search, any knowledge discovery or creation exercise today
includes web search as an integral supporting activity. This naturally leads to the question of whether
similar search technologies can be applied to enterprise information retrieval.
Interest in enterprise search has also been fueled by the increasing amounts of text (and other
unstructured) information generated and maintained by large enterprises and the use of search
technologies to index such data. There also interest in exploring whether search techniques apply to
structured data.
An end-user’s view of a business intelligence application is that of a variety of reports that aggregate
operational details of the enterprise summarizing business performance. For example, sales analysis may
require viewing quarterly sales of products from different categories (such as ‘consumer’ versus
‘enterprise’), segregated by region.
Data Warehousing
Actual operational data maintained by the enterprise is in terms of orders placed by customers, shipments
dispatched, invoices raised and payments made. Further, the number of such records can be very large.
For example, a large global retail chain might generate a few million such records a day. Operational data
needs to be transformed into a form on which a variety of reports can be computed. The process of
extracting and transforming operational data into such a ‘reporting database’ is called data warehousing.
1. Removing all purely operational data, such as remarks or shipping reference numbers.
2. Time stamping and related restructuring of data so that it represents historically valid snapshots:
For example, the category of a product may change over time; therefore the product category at
89
the time of sale needs to be stored along with a sales record instead of in a separate product
category table, so that even if a product changes category, historically correct information is
maintained.
3. Computing and inserting derived data, such as the location of a sale, which is possibly defined by
the city and country specified in the customer’s address, if available, or by the address of the retail
store where the sale was made.
4. Aggregating measures by the lowest expected granularity required for reporting, such as
aggregating sales figures at a weekly level rather than by date, if it is determined that this is the
finest level to which reporting may be needed.
5. Computing any required aggregates based on the desired semantics. For example, is a ‘sales
record’ an order, a payment, or an invoice? The period in which a sale may be counted may be
different in each case. Moreover, some invoices may be unpaid or some orders rejected. Such
facts would need to be accounted for while creating ‘sales records’ in the data warehouse.
Usually an enterprise data warehouse aggregates many different measures of enterprise performance.
Thus, in addition to sales, other measures such as income, costs, shipment delivery times and average
manufacturing production throughput are also captured along with relevant dimensions. Such a large data
model becomes difficult to navigate and query; therefore purpose specific data is often extracted from
the enterprise data warehouse into a data mart. For example, a sales data mart would include only sales
information with relevant dimensions, leaving out dimensions such as manufacturing location, or product
cost.
OLAP stands for On-line Analytical Processing. OLAP is analytical system and deals with historical data with
low volume of transactions. Response time is an effective measure of the OLAP systems. Data is stored in
multi-dimensional schemes and is aggregated. Queries are quite complex here. Its processing speed
depends upon the amount of data involved.
90
Figure 39 High Level Differences of OLTP and OLAP
o OLTP stands for On-line Transaction Processing while OLAP stands for On-line Analytical
Processing.
o OLTP provides data to data warehouse while OLAP analyze this data.
o OLTP deals with operational data while OLAP deals with historical data.
o In OLTP queries are simple while in OLAP queries are relatively complex.
o Processing speed of OLTP is very fast while in OLAP processing speed depends upon the amount
of data.
o OLTP requires less space for data as compare to OLAP.
o Database design of OLAP is highly normalized with many tables while in OLAP the database design
is de-normalized with few tables.
o In OLTP database transactions are short while in OLAP database transaction are long.
o IN OLTP volume transactions are high while in OLAP volume transaction are low.
o In OLAP transaction recovery is necessary while in OLTP transaction recovery is not necessary.
o OLTP focuses on updating data while OLAP focuses on reporting and retrieval of data
91
Figure 40 Star schema
Instead, the data mining approach mathematically models the analysis task. This results in a few broad
categories of problems that can be solved (using a variety of computational techniques), rather than
relying on human analysis alone:
o Classifying data by manually assigning labels (e.g. ‘valuable’) to a known subset of data, and using
this to construct a classifier, i.e. a mathematical model, which can then be used to automatically
assign the labels for remaining data, or for new records as they arrive.
o Clustering data into groups that are more ‘similar’ to each other than to other clusters, for
example to determine which documents discuss the same set of topics, or which customers
exhibit similar buying patterns.
o Identifying anomalies, which are records very dissimilar from the vast majority of data, such as in
fraud detection, or crime and intelligence investigations.
o Analyzing patterns in subsets of data that have particularly strong connections to each other,
especially in conjunction with other techniques, such as anomaly detection or clustering: For
example, automatically characterizing anomalous behavior in terms of ‘explanations’ that yield
deeper insight, or describing the actual behavior patterns of customers belonging to the same
cluster.
o Making predictions by choosing hypotheses that might explain data, by constructing probabilistic
models, such as in tracking a moving target, modeling price movements or fault diagnosis.
92
References
Assessment
Answer the following questions:
1. How can Cloud computing be an impact to the new delivery models on operational service
qualities?
2. Who pioneered the design of cloud models in cloud computing fields? What are their major
differences?
3. Define Internet as a Service.
4. What do we mean about Commoditization of the data centers?
5. What is Data Warehousing?
93
APPENDIX A. Course Syllabus
2. Effective Communication Communicate effectively with the computing community Document data gathered in every step of the process.
Graduates are proficient in the four macro skills in and with society-at- large about complex computing Create reports on progress updates.
communication (reading, writing, listening, and speaking) activities through logical writing, presentations, and Create project presentations on the application
and are able to use these skills in solving problems. clear instructions.
Making decisions and articulating thoughts when
engaging with people in various circumstances.
3. Strong Service Orientation Function effectively as a member or leader of a Perform tasks, depending on the role assignment
Graduates exemplify the potentialities of an efficient, development team recognizing the different roles within Contribute expertise to other members of the team.
well-rounded and responsible professional deeply a team to accomplish a common goal. Solve problems, whether technical and or non-technical
committed to service excellence. issues that may arise.
94
4. Community Engagement Analyze the local and global impact of computing Design and develop solutions which are relevant to the
Graduates take an active role in the promotion and information technology on individuals, organizations, changing needs of the stakeholders
fulfillment of various advocacies (educational, social and and society.
environmental) for the advancement of community
welfare. Integrate IT-based solutions into the user environment
effectively.
5. Adeptness in the Responsible Use of Technology Apply knowledge through the use of current techniques, Design and develop solutions that will cater to the needs
Graduates demonstrate optimized use of digital learning skills, tools and practices necessary for the IT profession of the organization
abilities, including technical and numerical skills.
Understand best practices and standards and their
applications.
6. Passion to Lifelong Learning Recognize the need for and engage in planning, self- Plan knowledge sharing with the team for lessons
Graduates are enabled to perform and function in the learning, and improving performance as a foundation for which will be applied in the design.
society by taking responsibility in their quest to know continuing professional development.
more about the world through lifelong learning.
7. High Level of Leadership and Organizational Skills Function effectively as a member or leader of a Perform the role of a leader and organize the team so
Graduates are developed to become the best professionals development team recognizing the different roles within that each member will be able to maximize his full
in their respective disciplines by manifesting the a team to accomplish a common goal. potential
appropriate skills and leaderships qualities.
8. Sense of Personal and Professional Ethics Understand professional, ethical, legal, security and Design solutions which will be useful or beneficial to the
Graduates show desirable attitudes and behavior either in social issues and responsibilities in the utilization of well-being of the stakeholders
their personal and professional circumstances. information technology.
9. Sense of National and Global Responsiveness Analyze the local and global impact of computing Design solutions which will be useful or beneficial to the
Graduates’ deep sense of national compliments the need information technology on individuals, organizations, broader segment of the community
to live in a global village where one’s culture and other and society.
people culture are respected.
95
Course Plan
96
e. Discover TOGAF Composition, Use
and Benefits.
Week 5 Components of Enterprise a. Enumerate and explain each Online Class Instructional Online quiz
Architecture components of Enterprise Architecture Discussion Manual
a. Enterprise Architecture and b. Differentiate the approach of IT on Reading Online application
its Components development and support of Assignment Slide Presentation
Enterprise Architecture
Week 6-7 Enterprise Information a. Examine the different data domains Online Class Instructional Online quiz
Architecture Concepts that is being used in the line of Discussion Manual
a. EIA Data Domains, business of an enterprise. Reading Online application
Information Governance, b. Determine the different areas IT Assignment Slide Presentation
and Information Security governance that tightly coupled in
b. Conceptual and Logical business strategies and objectives.
View of Enterprise c. Identify the different aspects of IT
Information Architecture security and Information Privacy
c. Component Model and services.
Operational Model of d. Acquire knowledge on Conceptual and
Enterprise Information Logical views of Enterprise
Architecture Information Architecture.
e. Design the Component Model of an
Enterprise Information Architecture
and to assemble the corresponding
Operational Model.
Week 8 Enterprise Architecture Methods a. Review the evolution of systems Online Class Instructional Online quiz
a. Evolution of Systems development methodologies. Discussion Manual
Development Methodology b. Identify the different strategies for Reading Online application
b. Strategies for Enterprise enterprise architecture Assignment Slide Presentation
Architecture implementations
Implementation c. Plan EA based on Incremental Build
c. Enterprise Architecture Context
Incremental Build Context
Week 9 MIDTERM Online Midterm Examination
Week 10-11 Enterprise Integration a. Discuss the different Integrating Online Class Instructional Online quiz
Technologies Technologies used in an Enterprise Discussion Manual
a. Integrating Technologies Architecture. Reading Online application
b. Enterprise Application b. Describe the Direct to Point-to-Point, Assignment Slide Presentation
Integration Concepts and Middleware approach in
c. Enterprise Portal Integrations.
Technologies for c. Explain the concept of XML in
Integration enterprise application integration.
97
d. Web Services for Real-Time d. Discuss the usage of Enterprise Portal
Integration in Enterprise Integration.
e. Service-Oriented e. Identify the different Web Service
Architecture for Integration Technologies for Real Time
Integration.
f. Define Service-Oriented Architecture
and its services for Integration.
Week 12 Enterprise Resource Planning a. Discuss the role of Enterprise Online Class Instructional Online quiz
a. Definition of Enterprise Planning to Physical and Logical Discussion Manual
Resource Planning Integrations. Reading Online application
b. ERP and Systems b. Assess the implications of ERP to Assignment Slide Presentation
Integration Management.
c. ERP’s Role in Logical c. Distinguish ERP to E- Commerce.
Integration d. Identify the components of ERP and
d. ERP’s Role in Physical its Architecture.
Integration e. Discuss the ERP Implementations and
e. ERP implications for Pros and cons in Business Level.
Management f. Give examples of ERP Vendors
f. Comparison of E-
Commerce and ERP
g. ERP- Architecture and
Components
h. ERP Implementations
Week 13-14 Other EA Enabling Technologies a. Explain the role of Cloud Computing Online Class Instructional Online quiz
Cloud Computing in IT and Business Enterprise. Discussion Manual
Business Intelligence, Analytics b. Discuss the common cloud models of Reading Online application
and Search cloud providers. Assignment Slide Presentation
c. Explore the future of enterprise cloud
computing.
d. Determine the different approaches
that Business Intelligence can offer in
an enterprise.
e. Discuss the Data Warehousing Process
f. Illustrate some text and Data mining
approaches in BI.
g. Distinguish the OLAP and OLTP
Processing tool.
Week 15-17 Project Demonstrate the ability to integrate Project
Discussions/Presentations heterogeneous systems into a cohesive Online Submission of
application. Documentation/
Online Presentation
98
Suggested Readings and References
REFERENCES
1. The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight , 2010, by Mario Godinez, Eberhard Hechler, Klaus
Koenig, Steve Lockwood, Martin Oberhofer, Michael Schroeck
2. Enterprise Systems Integration by Judith Myerson
3. Enterprise Integration , An Architecture for Enterprise Application and Systems Integration, 2002 by Fred A. Cummins
4. Business Intelligence Guidebook, from Data Integration to Analytics, by Rick Sherman
5. Principles of Data Integration by AnHai Doan, Alon Halevy, Zachary Ives
6. System Architecture with XML, 2003, Daum Berthold, Merten Udo
7. Enterprise Cloud Computing: Technology, Architecture, Applications, 2010, by Gautam, Shroff
8. SOA- Based Enterprise Integration: A Step by Step Guide to Service-Based Application Integration, 2009, by Roshen, Waseem
9. Handbook of Systems Engineering and management, 1999, by Sage, Andrew P., Rouse, William B
10. Handbook of Enterprise Integration, 2010, by Sherif, Mostafa Hashem
Project Rubrics
CRITERIA EXCELLENT GOOD SATISFACTORY POOR FAILED
96-100 86-95 76-85 60-75 Below 60
Content (50%) Analysis and Analysis and Analysis and Analysis and
integration of the integration subject integration subject integration subject
Did not submit
subject matter is clear matter is clear and matter is under matter is
and convincing effective developed unsophisticated
Organization (30%) Paper shows
Paper shows good Paper lacks clear
exceptionally clear Paper is disorganized
organization, purpose organization, purpose
organization, purpose and confusing
and focus and focus
and focus
Grammar (10%) Some grammatical Appropriate
mistakes but grammatical
Free of most Frequent grammatical
generally shows knowledge not
grammatical errors errors
successful grammar displayed for current
usage language level
Timeliness (10%) Assignment turned in -
Assignment turned in Assignment turned in
earlier than the
on time late
deadline
99
COURSE ASSESSMENT& EVALUATION CRITERIA (GRADING & REQUIREMENTS)
Assignments / Quizzes / Exercises
Major Requirements
Midterm and Final Exam
Faculty in charge will decide what Project to be provided.
GRADING SYSTEM:
FIRST GRADING = Class Standing (70%): Quizzes, Recitation, Assignment, Exercises, Project; Midterm Examination (30%)
SECOND GRADING = Class Standing (70%): Quizzes, Recitation, Assignment, Exercises, Project; Final Examination (30%)
** Course Syllabus taken from the University of the Sunshine Coast, Queensland, Australia (ICT 321 Architecture and Systems Integration)
100
Prepared by: Reviewed by:
Recommending Approval:
Approved by:
101
102