MDA & SOA in the Enterprise - OMG€¦ · The Good "Strategic reduction in operating cost – up to...
Transcript of MDA & SOA in the Enterprise - OMG€¦ · The Good "Strategic reduction in operating cost – up to...
MDA & SOA in the Enterprise
Applying Model Driven Architecture (MDA) and Value Chain Analysis (VCA) to Services Oriented
Architecture (SOA) to enable the Executable Enterprise
VCAMDASOA/ESB
Case Study
U.S. General Services Administration (GSA)
Sections reproduced with the permission of the GSA – George Thomas
Customer: GSA OCIO
Provider: LMI & Data Access Technologies
Tooling: Component-X
Copyright © 2000-2005, Data Access Technologies, Inc.
“Sea Change”! Sea of change
"Get-it-right (Initiative for better acquisition)"Merger of FTS/FSS (Major Internal Organizations)" Restructuring to provide a unified face to the customer"OMB and Congressional mandates and changes of mission" Integrating and modernizing financial management" Reduction of redundant processes and systems
! Implications"Massive organizational change"Massive system changes" Retraining staff"High cost of change" Risky and hard to achieve" Change combined with current costs and inefficiencies of
redundant stovepipe systems is not practical
Copyright © 2000-2005, Data Access Technologies, Inc.
“Sea Change” Enablers & Cost Reduction
! Value Chain Analysis"Analyzing and restructuring business processes based on
realized customer value
! Model Driven Executable Architecture"Executable enterprise architecture to realize business goals
with systems and workflow automation
! Business Service Oriented Architecture / ESB"An enterprise modernization strategy supporting business
services, integration, reuse and common components across a system of systems integrated with SOA/ESB
! Combined effect of more automated processes
Being able to realize your business goals – priceless!
Copyright © 2000-2005, Data Access Technologies, Inc.
One-GSA Initiative
H.R.Finance
Marketing
PBS
FTS
FSS
Schedules
Buildings
I.T.
Telecoms
One-GSASolutions
Stovepipes
Un-Architected Solution Architected Solution
Auto
Supplies
Copyright © 2000-2005, Data Access Technologies, Inc.
Acquisition Model Today
Customer Needs
FSS
FTS
PBS
Solution Provider
Finance
Acquisition system
Solution Provider
Solution Provider
Finance
Finance
Acquisition system
Acquisition system
GS
A
GS
A
Suppli
es
Space lease
IT Services Customer Solutions
Copyright © 2000-2005, Data Access Technologies, Inc.
To Be Acquisition Model
Customer Needs
Contracting
Finance
Project Management
Vendor Solution
Solution Provider
Solution Provider
GS
A
GS
A
Copyright © 2000-2005, Data Access Technologies, Inc.
System + Investment cost over 6 years
0
20
40
60
80
100
120
140
160
Year 1 Year 2 Year 3 Year 4 Year 5 Year 6
BaselineOption BOption C
Note: Representative Numbers Est. NPV Break Even – About 6 Years
Business Advantage Savings Not Included
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise Service Bus to Enable Target State! Services driven from the
business model! Reusable Enterprise Services
are independent & easily adapted and interconnected" Services communicate with
each other like humans do with email
! Information systems become a lattice of cooperating services
! CIO to Provide an “Enterprise Service Bus” using commercial standards" Industry best practice to avoid
developing large monolithic applications
One-GSA Business Model
FundsManagementService
ContractingService
Solution ProviderService
ProjectManagementService
Enterpr
ise S
ervice
s
Copyright © 2000-2005, Data Access Technologies, Inc.
Legacy “Wrapping”Legacy “Wrapping”
Wrapping allows existing programsWrapping allows existing programsand data to work with and workand data to work with and workas enterprise components.as enterprise components.Legacy systems are wrapped asLegacy systems are wrapped asa set of services.a set of services.
AdaptersAdvantage
EnterpriseServices
PurchasingServices
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise Modernization Strategy
! Identify components that will offer greatest ROI" Create target executable model
⌧We have a baseline with the One-GSA model!
" Identify system of systems to consider for target" Pick an alternative for each;
• Evolve one or more current systems to support target processes, take on new capabilities and support One-GSA interfaces and/or
• Harvest one or more systems to build a replacement and/or• Integrate functionality into shared services as common components and/or• Replace systems or parts of systems that are no longer suitable.
"Model driven SOA provides the flexibility to mix and match approaches as required. Commonality where possible – diversity where necessary. Evolving over time from integration to common components.
" End result – architected system of systems
Copyright © 2000-2005, Data Access Technologies, Inc.
Systems to Role Based Service Components
SystemSystem
SystemSystemSystemSystem
SystemSystemSystemSystemSystemSystem
Copyright © 2000-2005, Data Access Technologies, Inc.
Transition by role, not system
System
System
System
System System
SystemSystem
System
System
RoleRole
Role
Role
Role
Role
Role
Role
Role
Role
EnterpriseService
Bus
Still Theory
Copyright © 2000-2005, Data Access Technologies, Inc.
Consolidation into Service Components
! The Good" Strategic reduction in operating cost – up to 50%" Agile business processes"Unification of the enterprise"Only way to achieve enterprise transition?
! The Bad" Investment in change – As high as 25%" Legacy and packaged systems are not componentized
! The Ugly" Change is expensive and can be disruptive" Current boundaries and ownership change – may require centralized
authority and budgeting" Requires more “enterprise” agreement – very difficult to get consensus
Copyright © 2000-2005, Data Access Technologies, Inc.
Strategic Migration
Separate and Non-Interoperable Applications
Ad Hoc Point to Point Integration of Monolithic Systems
Systems Composed of Interoperable Components
Standards based integration of Monolithic Systems
Executable Enterprise Architecture Drives Agile Systems of Systems using Interoperable Components
•Are you here?
Target State
Copyright © 2000-2005, Data Access Technologies, Inc.
MDA Enhanced Procurement
Order &Requirements
Fund/Contract
Solution
AnalyzeRequirements against
or Create BA
Solution
MDA EnterpriseArchitecture
Elaborate Components
Service ComponentReuse Library
ComponentComponentGenerate
AdaptConstruct
SC IntegrationTesting
Fund/ContractFund/ContractFund/ContractReuseContractor
DesignImplement
Test
Current Strategic
Copyright © 2000-2005, Data Access Technologies, Inc.
EA Governance Structure
One GSA Target EA
OMB - 300Initiative
EA Governance
Acquisition
Business Drivers
•Guides
•Refines
Specifies
•Satisfies
Copyright © 2000-2005, Data Access Technologies, Inc.
The “One GSA” EARepository
IT Capital Planning and Investment
Control
PerformanceManagement
Process
Human CapitalPlanning
GSAStrategic
Plan
•The “One GSA” EA aligns with:$GSA Strategic Plan
$IT Capital Planning and Investment Control process
$Human Capital Planning process
$Performance Management process
$Competitive Sourcing$Governance
“One GSA” EA Strategic IntegrationEA is a STRATEGIC ASSET
Competitive Sourcing
The “One GSA” EA repository houses models and artifacts that have been vetted and agreed to.
Enterprise MDA
An approach to realizing executable enterprise architecture with MDA and SOA
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise MDA
!Architecture at the Enterprise Level"Systems of systems"Collaboration of organizations, systems & people"Wide-scale collaborative processes
⌧roles and responsibilities"Business Service Oriented Architecture"Enterprise Components"Componentizing functionality – not creating it"Executable processes – smooth transition from model
to simulation to solution!Executable Enterprise Architecture
Copyright © 2000-2005, Data Access Technologies, Inc.
The OMG-Enterprise Collaboration Architecture
! ECA is a “profile of UML”, a way to use UML for a specific purpose - it is an OMG standard"That purpose is modeling enterprise systems.
! You can also think of this as a “modeling framework” for enterprise computing
! ECA is part of the “Model Driven Architecture” (MDA) initiative of the OMG"Using precise modeling techniques as part of the development
lifecycle to speed development and provide technology independence
! ECA has been adopted by the OMG as part of the EDOC Profile for UML specification.
Copyright © 2000-2005, Data Access Technologies, Inc.
Value Focused Target Architecture
One GSA Target EA
Time LineTrends
Critical Success Factors
Time LineTrends
Critical Success Factors
ProjectsProjects
Business ModelsBusiness Models
WorkflowWorkflow
I.T. Systems SpecsI.T. Systems Specs
Collaborative EnvironmentCollaborative Environment
Documentation &TrainingDocumentation &Training
Business DriversBusiness Drivers
Current ProcessesCurrent Processes
FARFAR
Current EnvironmentCurrent Environment
TrendsTrends
InitiativesInitiatives
Copyright © 2000-2005, Data Access Technologies, Inc.
DomainArchitecture
SimulatedModel Driven Architecture
SimulatorSimulator
EnterpriseEnterpriseArchitecture Architecture
ModelModel(CIM)(CIM)
Live Process Simulation
Refine/Iterate
ECA Standard“Meta-Model”& UML Profile
Copyright © 2000-2005, Data Access Technologies, Inc.
MetaMeta--ModelModelUML ProfileUML Profile(E.G. ECA)(E.G. ECA)
DomainArchitecture
AutomatedModel Driven Architecture
Framework &Framework &InfrastructureInfrastructure
(E.G. (E.G. --J2EEJ2EE--WS)WS)PSMPSM
InfrastructureInfrastructureMappingMapping
(E.G. J2EE(E.G. J2EE--WS)WS)
Mapping is tunedMapping is tunedto the infrastructureto the infrastructure
ToolsToolsProduce &Produce &IntegrateIntegrate
EnterpriseEnterpriseComponentsComponents
Enterprise Enterprise Architecture Architecture Model (CIM)Model (CIM)
Minimize and structuremanual implementation
C
TechnicalArchitecture
Copyright © 2000-2005, Data Access Technologies, Inc.
MetaMeta--ModelModelUML ProfileUML Profile(E.G. ECA)(E.G. ECA)
DomainArchitecture
AutomatedModel Driven Architecture
Framework &Framework &InfrastructureInfrastructure
(E.G. (E.G. --J2EEJ2EE--WS)WS)PSMPSM
InfrastructureInfrastructureMappingMapping
(E.G. J2EE(E.G. J2EE--WS)WS)
Mapping is tunedMapping is tunedto the infrastructureto the infrastructure
ToolsToolsProduce &Produce &IntegrateIntegrate
J2EEJ2EE--WSWSEnterpriseEnterprise
ComponentsComponents
Enterprise Enterprise Architecture Architecture Model (CIM)Model (CIM)
C
TechnArchite
SimulationSimulationInfrastructureInfrastructure
TeArc
InfrastructureInfrastructureMappingMapping
(E.G. .NET(E.G. .NET--WS)WS)
SimulatedSimulatedEnterpriseEnterprise
ComponentsComponentsC
Multiple and Changing Technology Support
C
Copyright © 2000-2005, Data Access Technologies, Inc.
Plan and Design Develop & Deliver Aftercare
FSS Gen PBS Gen FTS Gen
Detailed Workflows (Out of scope)
L0: Segment
L1: Process
L2: Task
L3: Activity
L4: Action
Gen
eric
Business Lines
Develop Market Making
Strategy and goals1.1
Establish products and
services offered
1.2
Establish and manage contracts
2.1
Plan, manage, maintain, monitor
inventories2.2
Provide product support,
education and communication
1.4
Receive order/request
for goods/services
2.3
Respond to order/request
2.4
Fulfill order/request
2.5
Billing /Payment
2.6
Provide problem management
support3.1
Provide contract/
schedules support
3.2
Maintain partner service level performance
3.3
Provide customer care, mission
response, and solicit feedback
3.4
Establish/maintain
marketplace1.3
Mission Critical Value Chain
Sche
dule
s
Sup
ply
OV
ALS
Pro
pert
y
Tra
vel a
nd
Tran
spor
tatio
n
New
Con
stru
ctio
n
Rep
airs
and
A
ltera
tions
Ow
ned
Inve
ntor
y
Leas
ed In
vent
ory
RW
A
IT S
ervi
ces
Net
wor
k S
ervi
ces
P
rofe
ssio
nal
Ser
vice
s
Engage in proactive
communication and marketing
1.3.3
Assess /re-assess needs1.3.3.1
Assess/re-assess needs
1.3.3.1
Assess /re-assess needs
1.3.3.1
Assess/re-assess needs
1.3.3.1
Assess /re-assess needs
1.3.3.1
Assess/re-assess needs
1.3.3.1 Detailed ActionsActions specific to
business lines
Activity generic across business lines
Copyright © 2000-2005, Data Access Technologies, Inc.
The Connected EnterpriseContent and Communication
AerialPhotos
DigitalMap
CensusData
HouseDrawings
PoliceRecords
PoliceDispatcher
Role
Copyright © 2000-2005, Data Access Technologies, Inc.
Multiple roles in a collaboration
Copyright © 2000-2005, Data Access Technologies, Inc.
Travel Expense Example
1: travelPermissionRequest2: travelPermission
3: expenseReport
4: authorizedExpenseReport
5: paymentRequest
Peter(Technical author)
Bill(Dispatcher)
Joyce(Sales clerk)
Douglas(Marketing manager)
Kim(Methodologist)
Elsie(Programmer)
Eve(Software Manager)
Bill(Bookkeeper)
Joe(Paymaster)
Adam(Chief Accountant)
Ruth(President)
John(Cashier)
Ann(Customer consultant)
Copyright © 2000-2005, Data Access Technologies, Inc.
Peter(Technical author)
Bill(Dispatcher)
Joyce(Sales clerk)
Douglas(Marketing manager)
Kim(Methodologist)
Elsie(Programmer)
Eve(Software Manager)
Bill(Bookkeeper)
Joe(Paymaster)
Adam(Chief Accountant)
Ruth(President)
John(Cashier)
Ann(Customer consultant)
DiagramTravel Expense Model
/ Paymaster
/ BookKeeper / Traveler
/ Authorizer
Objects --> ClassifierRoles
Copyright © 2000-2005, Data Access Technologies, Inc.
Collaboration Diagram
Traveler Authorizer Book Keeper
Paymaster
Copyright © 2000-2005, Data Access Technologies, Inc.
The Marketplace Example
Mechanics Are UsBuyer
Acme IndustriesSeller
GetItThere FreightShipper
Order
Conformation
Ship Req
Shipped
Shipped
PhysicalDelivery
Delivered
Status
ProcessComplete
Copyright © 2000-2005, Data Access Technologies, Inc.
Where are the services?
Mechanics Are UsBuyer
Acme IndustriesSeller
GetItThere FreightShipper
Order
Conformation
Ship Req
Shipped
Shipped
PhysicalDelivery
Delivered
Status
WebService
WebService
WebService Web
Service
WebService
Copyright © 2000-2005, Data Access Technologies, Inc.
Inside the Seller
Order
Conformation
Shipped
Ship Req
Shipped
Delivered
Order Processing
Shipping
Receivables
Event
WebService
WebService
WebService
WebService
WebService
WebService
WebService
WebService
Copyright © 2000-2005, Data Access Technologies, Inc.
Implementation
Net
Hardware
OperatingSystem
Framework,Middleware& Container
Roles to Systems
Interaction Path
Component in Role
Interaction(With Information)
Role
Collaboration
One-GSA Methodology
A simple methodology for creating collaborative business processes
Copyright © 2000-2005, Data Access Technologies, Inc.
Basic Steps
! Define business goals using Value Chain Analysis! Refine to high-level activities! Identify roles and organize roles into collaborations! Define collaboration documents! Create basic business transactions! Organize into protocols and events! Use protocols to define ports on roles! Drill-down into role detail! Use model as basis for acquisition! Acquire/Implement roles! Configure implementations for deployment with technology specifics! Deploy
Copyright © 2000-2005, Data Access Technologies, Inc.
Plan and Design Develop & Deliver Aftercare
FSS Gen PBS Gen FTS Gen
Detailed Workflows (Out of scope)
L0: Segment
L1: Process
L2: Task
L3: Activity
L4: Action
Gen
eric
Business Lines
Develop Market Making
Strategy and goals1.1
Establish products and
services offered
1.2
Establish and manage contracts
2.1
Plan, manage, maintain, monitor
inventories2.2
Provide product support,
education and communication
1.4
Receive order/request
for goods/services
2.3
Respond to order/request
2.4
Fulfill order/request
2.5
Billing /Payment
2.6
Provide problem management
support3.1
Provide contract/
schedules support
3.2
Maintain partner service level performance
3.3
Provide customer care, mission
response, and solicit feedback
3.4
Establish/maintain
marketplace1.3
Mission Critical Value Chain
Sche
dule
s
Sup
ply
OV
ALS
Pro
pert
y
Tra
vel a
nd
Tran
spor
tatio
n
New
Con
stru
ctio
n
Rep
airs
and
A
ltera
tions
Ow
ned
Inve
ntor
y
Leas
ed In
vent
ory
RW
A
IT S
ervi
ces
Net
wor
k S
ervi
ces
P
rofe
ssio
nal
Ser
vice
s
Engage in proactive
communication and marketing
1.3.3
Assess /re-assess needs1.3.3.1
Assess/re-assess needs
1.3.3.1
Assess /re-assess needs
1.3.3.1
Assess/re-assess needs
1.3.3.1
Assess /re-assess needs
1.3.3.1
Assess/re-assess needs
1.3.3.1 Detailed ActionsActions specific to
business lines
Activity generic across business lines
Copyright © 2000-2005, Data Access Technologies, Inc.
Notificationof Order
Completion
PaymentNotification
DeliverySchedule
Goods andServices
PurchaseOrder
AwardNotificationRFQs ow
Pegasys/Near
Order to Payment (Future State) - Involves only Purchases viaSchedules
Sup
plie
r:Fi
nanc
ial
Offi
cer
Sup
plie
r:C
ontra
ctO
ffice
r
FSS:
Fina
ncia
l O
ffice
rIn
form
atio
nC
ontra
ctin
gC
usto
mer
:Pr
ojec
t Man
ager
Supp
lier:
Pro
ject
Man
ager
FSS
:O
rder
Man
ager
Sys
tem
sC
usto
mer
:Fi
nanc
ial
Offi
cer
Issue RFQ
Review RFQ
SubmitResponse
Conduct initialevaluation
eBuy (GUI interface)
Scheduleinformation(e-Library)
Processpurchase orders
Scheduledelivery ofgoods andservices
Accept Goods/Services
ProcessPayment
Dev elopPurchasing
Request (SOW,SLA, pricing,
timeline)
Adv antage DB
Customer financialsystems
Determine itemprice/
availability/contract
Notification oforder completion
Determineproject need for
products andservices
CombineProject
requirements
Conductresearch usinge-Library/eBuy
Record funding
Evaluatevendor
responses
Prepare Order
Obligate funds
Check orderstatus
ReceivePayment
Realize revenue
Close out order
Receive invoice
Funds
CustomerProcurement
Systems
Supplier Catalogs FSS-19
A B C D E
H
I JK L M N O P
A, F, I, L
E-Library
F
B, O
A, I,L
A, J A, D, J
A, J
A, J, L
A, J, L
B, E, O, S
A, D, G, M
A, E, L, M, S A, E, L, M, S
A, J, L
A, E, L, S
B, Q, S
B, C,T
B, D, Q, S
G, O, Q
Supplier FinancialSystems
G
Q
Bill Customer
R
I, R
S
Create Invoice
DevelopEvaluation
criteria/provideinput
ConductMarket
Research/Survey
Respond?Develop
response toRFQ
RFQ via eBuy
Yes
Responses via eBuy
Request review of responses
Answerquestions/
provide inputDistribute POs
POvia eBuyNo interest, Customer w ill
review other quotesNo
QuestionsAnswers
ReceivePurchaseOrders
Customer Invoice
Notif ication ofpayment received
Delivery Schedule
Receive RFQ
RFQ
RFQresponse
Review POs
POs
I
I
A, J
A, D, J
A, E, L, M, S
K A, D, G, P
D, G, M, P, Q D, G, M, P, Q
E, R, S
Inspect/Receivegoods andservices
B, C, N, P
DeliveryReceipt
T
DeliveryReceipt
ReceiveDeliverySchedule
B, C, N, P
Provideschedule
updates to FSSShip Goods
ReceiveDeliveryReceipt
Close outOrder
Goods/Services
Delivery Receipt
Payment orFunds Transfer
A, D, G, P A, D, G, N A, D, G, T A, D, G
Request fundavailability
Funding validated
DevelopAcquisition
Plan
CoordinateAcquisitionPlanning
Acquisition Plan Input
Receivepurchase
request datafrom PM
Assign contractspecialist
SOW
Evaluate PastPerformance
Aw ard Decision
Obligation
Monitor anddocument
performance
Close out order
A, K, L
Issue Aw ardNotices
Check orderstatus
B, C, SA, I, K,L
Final factfinding w ithsuppliers
VerifyFunds
Acceptance
ReceivePOs
POs via eBuy
Build RFQ
Market Research
Answerquestions/
provide input
Receivedeliveryschedule/updates
Receivedeliveryreceipts
Delivery scheduleupdates
Providecopy of
receipt toFSS
Delivery Receipts
Perform 3-w ayMatch
POs
Order to Payment Process Diagram
Copyright © 2000-2005, Data Access Technologies, Inc.
Order to Payment (Future State) - Involves only Purchases viaSchedules
Sup
plie
r:C
ontra
ctO
ffice
rC
ontra
ctin
gC
usto
mer
:Pr
ojec
t Man
ager
plie
r:M
anag
erC
usto
mer
:Fi
nanc
ial
Offi
cer
Issue RFQ
Review RFQ
SubmitResponse
Conduct initialevaluation
Dev elopPurchasing
Request (SOW,SLA, pricing,
timeline)
Determine itemprice/
availability/contract
Determineproject need for
products andservices
CombineProject
requirements
Conductresearch usinge-Library/eBuy
Record funding
Evaluatevendor
responses
A, F, I, L
B, O
A, I,L
A J A D J
A, J
A, J, L
A, J, LI, R
DevelopEvaluation
criteria/provideinput
ConductMarket
Research/Survey
Respond?Develop
response toRFQ
RFQ via eBuy
Yes
Responses via eBuy
Request review of responses
Answerquestions/
provide input
QuestionsAnswer
Receive RFQ
RFQ
RFQresponse
I
I
A, J
A, D, J
Request fundavailability
Funding validated
DevelopAcquisition
Plan
CoordinateAcquisitionPlanning
Acquisition Plan Input
Receivepurchase
request datafrom PM
Assign contractspecialist
SOW
EvaluatePerform
A, I, K,L
Final factfinding w ithsuppliers
Build RFQ
Market Research
Order to Payment Process Diagram
Copyright © 2000-2005, Data Access Technologies, Inc.
Finding the Roles and Inner Roles
Customer Project ManagerCustomer Contracting
Customer Financial OfficerSupplier Financial OfficerSupplier Project Manager
Supplier Contracting OfficerFSS: Order ManagerFSS: Financial Officer
“Swim Lanes”
Order to Payment
Customer ProcurementBroker
Supplier
ProjectManager
ContractingOfficer
FinancialOfficer
ProjectManager
ContractingOfficer
FinancialOfficer
FinancialOfficer
OrderManager
RFQManager
CatalogManager
Roles in a Collaboration
Copyright © 2000-2005, Data Access Technologies, Inc.
High-level role identification
CustomerContracting
IndustryPartner
BusinessPlanning
CustomerLiaison
AccountManagement
User
CustomerFinance
OfferingLine
Management
OfferingManagement
CustomerStrategy
ProjectManagement
CustomerCare Accounting
CustomerContact
FundsManagement
Contracting
SolutionProvider
Source Selection Authority
Technical Management
Small Business Specialist
Legal Officer
Administrative Support
CustomerProgram
Management
AgencyCustomer GSA
IndustryPartner
Con
tract
ing
Team
Copyright © 2000-2005, Data Access Technologies, Inc.
Summary Top Level Collaboration
Simplified View - Level of detail is optional
Copyright © 2000-2005, Data Access Technologies, Inc.
Co-Managed Services Collaboration
Copyright © 2000-2005, Data Access Technologies, Inc.
Drilling Down into Customer Detail
Customer
ProjectManager
ContractingOfficer
FinancialOfficer
Copyright © 2000-2005, Data Access Technologies, Inc.
Choreography of Process
Copyright © 2000-2005, Data Access Technologies, Inc.
Sup
plie
r:C
ontra
ctO
ffice
rC
ontra
ctin
gC
usto
mer
:P
roje
ct M
anag
erS
uppl
ier:
Proj
ect M
anag
erC
usto
mer
:F
inan
cial
Offi
cer
Issue RFQ
Review RFQ
SubmitResponse
Conduct initialevaluation
DevelopPurchasing
Request (SOW,SLA, pricing,
timeline)
Determine itemprice/
availability/contract
Determineproject need forproducts and
services
CombineProject
requirements
Conductresearch usinge-Library/eBuy
Record funding
Evaluatevendor
responses
A, F, I, L
B, O
A, I, L
A, J A, D, J
A, J
A, J, L
A, J, LI, R
DevelopEvaluation
criteria/provideinput
ConductMarket
Research/Survey
Respond?Develop
response toRFQ
RFQ via eBuy
Yes
Responses via eBuy
Request review of responses
Answerquestions/
provide input
No interest, Customer willi th t
No
QuestionsAnswer
Receive RFQ
RFQ
RFQresponse
I
I
A, J
A, D, J
Request fundavailability
Funding validated
DevelopAcquisition
Plan
CoordinateAcquisitionPlanning
Acquisition Plan Input
Receivepurchase
request datafrom PM
Assign contractspecialist
SOW
EvaluatePerform
A, I, K, L
Final fact findingwith suppliers
Build RFQ
Market Research
Answquesti
provide
ProtocolsProtocols group RoleRole Interactions Interactions into Conversations
Interaction MessagesInteraction Messages
Copyright © 2000-2005, Data Access Technologies, Inc.
Create Business Transactions
Copyright © 2000-2005, Data Access Technologies, Inc.
Organize into protocols
Copyright © 2000-2005, Data Access Technologies, Inc.
Inner Protocols
! Protocols represent conversations between roles
! Conversations frequently have sub-conversations, detail about a specific subject
! These sub-conversations are inner protocols
! Inner protocols can also be reused in other protocols or even as top-level protocols
! Protocols can “nest” to any level of detail
Copyright © 2000-2005, Data Access Technologies, Inc.
Operations & Business Transactions
! The highest level of interaction detail is specified as the flow of documents - business information.
! This can be as events or “business transactions”
! Business transactions are a “request/reply” that usually results in creating or satisfying some business commitment - it may take place over an extended time
! We specify abstract document types to represent the information that flows. Empty – “Abstract”
Copyright © 2000-2005, Data Access Technologies, Inc.
Modeling Collaboration Documents
! Fill in details of the documents! Focus on business information -
not technology! Collaboration - Not an information
model ! May be derived from existing
sources! Helps in creating technology
mappings - E.G. Web Services! Includes
" Composition" Type" Cardinality
Copyright © 2000-2005, Data Access Technologies, Inc.
Attach Protocols to Roles as “Ports”
Group transitions together into logical units
Copyright © 2000-2005, Data Access Technologies, Inc.
Detailed Information Flows
! Inside the activities we can drill down to inner activities or detailed document flows -sending and receiving information
! This is used for the simulation, to validate the the model is correct and ultimately to test the implemented components.
Copyright © 2000-2005, Data Access Technologies, Inc.
Drill-down
Copyright © 2000-2005, Data Access Technologies, Inc.
Sample Information Model
+Street : String+City : String+State : String+Zip : String
«EntityData»Addtress
+Cust
1
+Adr
1..*
+Name : String+Balance : Decimal = 0+AccountNo : long
«EntityData»Account
+InvNum : Integer+Total : Decimal
«EntityData»Invoice
-Act1-Invoices*
+Quantity : float-Price : Currency
«EntityData»LineItem +PartId : String
+Description : String+QtyInStock : float(idl)
«EntityData»Part
-Env
1
-Items
*
-Items
*
-Part
1+InvNum : Integer
«Key»InvoiceKey
-.
1
-.
1
+PartId : String
«Key»PartKey
-. 1
-. *
+AccountNo : String
«Key»AccountKey
-.
1
-.
1
+Name : String-CompanyId : String
«EntityData»Company
+CompanyId : String
«Key»CompanyKey
-.
1
-.
1
Copyright © 2000-2005, Data Access Technologies, Inc.
Adding Entities
! Entities are added to manage entity data
! Entity Roles are managers that provides a view of the same identity in another context
! The Entities have ports for managing and accessing the entities
! Non-entities which are owned by (aggregate into) an entity are managed by the entity
+Street : String+City : String+State : String+Zip : String
«EntityData»Addtress
+Cust
1
+Adr
1..*
+Name : String+Balance : Decimal = 0+AccountNo : long
«EntityData»Account
+AccountNo : String
«Key»AccountKey
-.
1
-.
1
+Name : String-CompanyId : String
«EntityData»Company
+CompanyId : String
«Key»CompanyKey
-.
1
-.
1
.Manages
<<Entity>>CompanyManager
Manage
<<EntityRole>>AccountManager
Manage
-Manages1-.1
Copyright © 2000-2005, Data Access Technologies, Inc.
Generated Web Service
Copyright © 2000-2005, Data Access Technologies, Inc.
Dealing with VariationMultiple Implementations of a Role
CustomerRole
(Logical)
DOL CustomerComponent
(Implementation)
DOI CustomerComponent
(Implementation)
Internal CustomerComponent
(Implementation)
The “Inside” can change as long as the external “contract” is satisfied
Architecture becomes part of Acquisition
Copyright © 2000-2005, Data Access Technologies, Inc.
Add implementation
!As component compositions!In a programming language!By using an external service!By Wrapping legacy systems
Copyright © 2000-2005, Data Access Technologies, Inc.
Add technology specifics for deployment
Copyright © 2000-2005, Data Access Technologies, Inc.
ECA/CCA Implementation at GSA
! Data Access Technologies" MDA experts, developers of ComponentX, One GSA EA support
⌧ enterprise-component.com
" Creators/contributors to OMG EDOC/ECA/CCA open standards
! ComponentX" Implements ECA/CCA, used by GSA EAPMO to create collaborative role
interaction models" Supports ‘model to integrate’, combining design-time and run-time tools, with
an extensible ‘component palette’" Supports FEA Line of Sight via aspect orientation " Supports ‘just in time’ model driven generated documentation
! ComponentX is a J2EE application" The models are executable – they’re java programs!" Web enabled simulations integrate with existing IT systems
! Widely used EA tools (Mettis, Popkin, MS-Office) don’t compare!
Copyright © 2000-2005, Data Access Technologies, Inc.
Collaborations Contextualize Roles
Copyright © 2000-2005, Data Access Technologies, Inc.
RolesRoles Compose Inner RolesInner Roles - Specify Service Granularity
Copyright © 2000-2005, Data Access Technologies, Inc.
Protocols Organize InformationInformation Choreographed by Roles
Copyright © 2000-2005, Data Access Technologies, Inc.
Fully Elaborated Protocols – DRM
! Focus is on business collaboration information - not on technology representation, or ODS information model
! This is an example of a ‘Purchasing’ Protocol with various inner Protocols and their Types specified
! Inner Protocols are sub-conversations, and they can be reused in other Protocols or as top-level Protocols
! This is an organizing framework for data entity composition and categorization, ala the DRM Information Exchange Package (IEP) idea
Copyright © 2000-2005, Data Access Technologies, Inc.
Collaboration Data – DRM Business Context
! FulfillmentNotice -Document<->Object as Business Information Entity that provides collaborative context to Core Data Components
! Includes Composition, Type and Cardinality
! May be derived from existing sources and mapped to any DRM Representation (Java Object, XML Document)
! GOAL is to link the ODS ERD to the SQL query executed by a ‘component in role’ on behalf of a specific business process collaboration
Copyright © 2000-2005, Data Access Technologies, Inc.
Roles Choreography Value Chain Activities
Copyright © 2000-2005, Data Access Technologies, Inc.
RolesRoles Choreograph Value Chain ActivitiesValue Chain ActivitiesS
uppl
ier:
Con
tract
Offi
cer
Con
tract
ing
Cus
tom
er:
Pro
ject
Man
ager
plie
r:M
anag
erC
ust
omer
:F
inan
cial
Offi
cer
Issue RFQ
Review RFQ
SubmitResponse
Conduct initialevaluation
DevelopPurchasing
Request (SOW,SLA, pricing,
timeline)
Determine itemprice/
availability/contract
Determineproject need forproducts and
services
CombineProject
requirements
Conductresearch usinge-Library/eBuy
Record funding
Evaluatevendor
responses
A, F, I, L
B, O
A, I, L
A J A D J
A, J
A, J, L
A, J, LI, R
DevelopEvaluation
criteria/provideinput
ConductMarket
Research/Survey
Respond?Develop
response toRFQ
RFQ via eBuy
Yes
Responses via eBuy
Request review of responses
Answerquestions/
provide input
QuestionsAnswer
Receive RFQ
RFQ
RFQresponse
I
I
A, J
A D J
Request fundavailability
Funding validated
DevelopAcquisition
Plan
CoordinateAcquisitionPlanning
Acquisition Plan Input
Receivepurchase
request datafrom PM
Assign contractspecialist
SOW
EvaluatePerform
A, I, K, L
Final fact findingwith suppliers
Build RFQ
Market Research
Copyright © 2000-2005, Data Access Technologies, Inc.
Multiple Implementations of a Role
CustomerRole
(Logical)
PBS CustomerComponent
(Implementation)
FSS CustomerComponent
(Implementation)
FTS CustomerComponent
(Implementation)
The “inside” can change as long as the external “contract” is satisfied – the key message to Organizations as we evolve IT systems to realize shared services on the GSA (or eGov) ESB
Copyright © 2000-2005, Data Access Technologies, Inc.
- Executable FEAPRM(BRM, SRMSRM, DRDRM,M, TRRM)
Delivering The Architecture
Copyright © 2000-2005, Data Access Technologies, Inc.
Simulating the Process
!Validation & Buy-in"Business stakeholders"SMEs"Systems Implementers
Copyright © 2000-2005, Data Access Technologies, Inc.
Initiating Activity
Copyright © 2000-2005, Data Access Technologies, Inc.
Activity interacting externaly
Copyright © 2000-2005, Data Access Technologies, Inc.
… With financial officer
Copyright © 2000-2005, Data Access Technologies, Inc.
Who records the funding
Copyright © 2000-2005, Data Access Technologies, Inc.
And the process returns to the PM
Federal Enterprise Architecture
Support for the FEA as a view of the enterprise architecture
Copyright © 2000-2005, Data Access Technologies, Inc.
FEA (from reference)
Copyright © 2000-2005, Data Access Technologies, Inc.
FEA/ComponentX
Reference model associations via aspect/properties
Community Process Roles, processes, activities
Copyright © 2000-2005, Data Access Technologies, Inc.
B-P-A-A as ABM input
Copyright © 2000-2005, Data Access Technologies, Inc.
Iterative Development
Build Build Build Build Build ReleaseBuild Deploy
BusinessModelDesign
InfrastructureDevelopment
Automation
Copyright © 2000-2005, Data Access Technologies, Inc.
Integration of infrastructure
Apl 1 CICS EJB .NET Cust Sys
Common Environment for Intellectual Capital
MDA EnvironmentModels define the system
Value ChainModeling
MOFIntellectualCapital
UMLModeling
WorkflowTools
BusinessModeling
CollaborationModeling
Meta Object Facility “Meta Models”
Realizing a Business Architecture
Roles to Enterprise Components & Services
Copyright © 2000-2005, Data Access Technologies, Inc.
Implementation
Net
Hardware
OperatingSystem
Framework,Middleware& Container
Roles to Systems
Interaction Path
Component in Role
Interaction(With Information)
Role
Collaboration
Copyright © 2000-2005, Data Access Technologies, Inc.
Business (CIM) view -Collaborating Roles
Role
Role Role Role
Copyright © 2000-2005, Data Access Technologies, Inc.
“Upper” PIM View - Enterprise Component
RoleRole
Enterprise Component
“Rotate” to lookAt other aspectsof the component
People, organizationsAnd/or enterprise componentsplay roles in BusinessProcesses.
Copyright © 2000-2005, Data Access Technologies, Inc.
Role
The “Enterprise Digital Assistant”
EnterpriseComponent
RolePeople, OrganizationsAnd systems play roles
Components frequentlyhelp people play these roles
Enterprise components help peopleand organizations play roles
by automating and monitoringThe business process
From the system perspective.People and organizations
become part of the implementationOf the role
Components are the peoplesAutomated assistant
BusinessProcess
People, organizations and systems
components work together to realize roles
Copyright © 2000-2005, Data Access Technologies, Inc.
Role
Role
People, Components & Organizations Collaborating
EnterpriseComponent
EnterpriseComponent
RoleEnterpriseComponent
Copyright © 2000-2005, Data Access Technologies, Inc.
EnterpriseComponent
EnterpriseComponent
“Lower” PIM View - Enterprise Component Internals
Containers
DBMS Data Managers
Adaptation Legacy Systems
EnterpriseComponent
UI Framework
Browser
Business Logic
UI Server Tier
UI Client Tier
Enterprise[Web] ServiceEnterprise
[Web] Service
Copyright © 2000-2005, Data Access Technologies, Inc.
PSM View - Mapping to [web] Services
Service Service
Service Service
One-wayService
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of a WSDL Engine
- <definitions xmlns="http://schemas.xmlsoap.org/wsdxmlns:soap="http://schemas.xmlsoap.org/wsdl/soapxmlns:mime="http://schemas.xmlsoap.org/wsdl/mimxmlns:http="http://schemas.xmlsoap.org/wsdl/http/ENC="http://schemas.xmlsoap.org/soap/encoding/xmlns:xs2000="http://www.w3.org/1999/XMLSchemxmlns:xs2001="http://www.w3.org/2001/XMLSchemtargetNamespace="urn:SellerServer" xmlns:tns="urn:Sexmlns:CoreTypes="urn:CoreTypes" xmlns:Ordering="urn
- <!--definitions obtained from component /BuySell/Deployment/Seller
AspectsWSDL
WSDL-SOAP
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of an Enterprise Component
- <service name="MySeller">
- <!--
implemented service role /BuySell/Deployment/SellerServer/MySeller -->
<documentation><p> </p></documentation>
- <port name="BuySellProtocol"binding="tns:BuySellProtocol">
- <!--
original service port was /BuySell/Deployment/SellerServer/MySeller/BuySellProtocol (extending Component </BuySell/SellerImplementation/MySeller/BuySellProtocol> ) -->
<soap:addresslocation="http://localhost:8080/cx/app/BuySell/Deployment/SellerServer/MySeller/BuySellProtocol" />
</port>
</service>
AspectsWSDL
WSDL-SOAP
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of a protocol binding
- <binding name="BuySellProtocol"type="tns:BuySellProtocol">
<soap:bindingtransport="http://schemas.xmlsoap.org/soap/hstyle="rpc" />
- <operation name="Order"><soap:operation
soapAction="urn:/BuySell/Community/BuySellPrcol/Order" style="rpc" />
- <input name="Order"><soap:body use="encoded" namespace="urn:SellerServ
encodingStyle="http://schemas.xmlsoap.org/soaencoding/" />
AspectsWSDL
WSDL-SOAP
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of a protocol
AspectsWSDL
WSDL-SOAP
- <portType name="BuySellProtocol">
- <!--
original cx operation = /BuySell/Community/BuySellProtocol/Order -->
- <operation name="Order">
- <!--
original cx flow port = /BuySell/Community/BuySellProtocol/Order/Order -->
<input name="Order" message="tns:Order" />
<output name="OrderConfirmation"message="tns:OrderConfirmation" />
<fault name="OrderDenied"message="tns:OrderDenied" />
</operation>
</portType>
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of message types
AspectsWSDL
WSDL-SOAP
-
- <message name="Order">
<part name="Order" type="Ordering:Order"
<message name="OrderConfirmation">
<part name="OrderConfirmation"type="Ordering:OrderConfirmation" />
</message> </message>
- <message name="OrderDenied">
<part name="OrderDenied"type="Ordering:OrderDenied" />
</message>
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of data types
- <xs2001:complexType name="Order">
-
- <xs2001:sequence>
<xs2001:element minOccurs="1"maxOccurs="1" name="CompanyID"type="CoreTypes:CompanyID" />
<xs2001:element minOccurs="1"maxOccurs="1" name="OrderID"type="Ordering:OrderID" />
<xs2001:element minOccurs="0"maxOccurs="unbounded" name="Item"type="Ordering:Item" />
</xs2001:sequence>
</xs2001:complexType>
Copyright © 2000-2005, Data Access Technologies, Inc.
High level tooling & infrastructure
!MUST BE SIMPLE!"We must be able to create better applications faster "We must separate the technology and business
concerns, enable the user
!Tooling + Infrastructure"Executable models are source code"Tooling must be technology aware"Infrastructure must support tooling, not manual
techniques
!Model based component architectures
Copyright © 2000-2005, Data Access Technologies, Inc.
High level tooling & infrastructure
!MUST BE SIMPLE!"We must be able to create better applications faster "We must separate the technology and business
concerns, enable the user
!Tooling + Infrastructure"Executable models are source code"aTooling must be technology aware"Infrastructure must support tooling
!Model based component architectures
Executable Models
Copyright © 2000-2005, Data Access Technologies, Inc.
Net effect
!Using these open standards and automated techniques we can;"80% Reduction in complexity (Conservative)"Achieve the strategic advantage of an open and
flexible enterprise"Produce and/or integrate these systems FASTER and
CHEAPER than could be done with legacy techniques"Provide a lasting software asset that will outlive the
technology of the day
Copyright © 2000-2005, Data Access Technologies, Inc.
Sample Applications
!One-GSA Executable Enterprise Architecture for the General Services Administration
!Enterprise Component Architecture for U.S. Army PEO-STRI
!Intelligence application for Raytheon & DARPA!Collaboration Architecture for Kaiser
Permanente
Copyright © 2000-2005, Data Access Technologies, Inc.
Contact
Cory Casanave
Data Access Technologies
www.enterprisecomponent.com