Handbook of Enterprise Systems Architecture in Practice
Handbook of Enterprise Systems Architecture in Practice
Kristin Klinger Kristin Roth Jennifer Neidig Sara Reed Sharon Berger Larissa Vinci Jamie Snavely Lisa Tosheff Yurchak Printing Inc.
Published in the United States of America by Information Science Reference (an imprint of Idea Group Inc.) 701 E. Chocolate Avenue, Suite 200 Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.info-sci-ref.com and in the United Kingdom by Information Science Reference (an imprint of Idea Group Inc.) 3 Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 0609 Web site: http://www.eurospanonline.com Copyright 2007 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Enterprise systems architecture in practice / Pallab Saha, editor. p. cm. Summary: This book is a valuable addition to the reading list of executives, managers, and staff in business, government, and other sectors who seek to keep their enterprises agile and efficient as they manage change, implement new business processes and supporting technologies, and pursue important strategic goals--Provided by publisher. Includes bibliographical references and index. ISBN 978-1-59904-189-6 (hardcover) -- ISBN 978--59904-191-9 (ebook) 1. ManagementData processing. 2. Business enterprisesCommunication systemsManagement. 3. Computer architecture. 4. Management information systems. I. Saha, Pallab, 1970HD30.2.E58 2007 658.4038011--dc22 2006033766 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book set is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher.
Table of Contents
Detailed Table of Contents ................................................................................................................. vi Foreword .............................................................................................................................................. xv Preface ................................................................................................................................................. xx Acknowledgments ............................................................................................................................ xxv
Section I Frameworks and Methodologies Chapter I A Synergistic Assessment of the Federal Enterprise Architecture Framework against GERAM (ISO15704:2000) / Pallab Saha .................................................................................. 1 Chapter II Extreme Architecture Framework: A Minimalist Framework for Modern Times / Phil Robinson and Floris Gout ......................................................................................................... 18 Chapter III Discovering and Modelling Enterprise Engineering Project Processes / Ovidiu Noran .................................................................................................................................... 39 Chapter IV Enterprise Architecture Framework for Agile and Interoperable Virtual Enterprises / Tae-Young Kim, Sunjae Lee, Jeong-Soo Lee, Kwangsoo Kim, and Cheol-Han Kim ........................ 62 Chapter V Activity-Based Methodology for Development and Analysis of Integrated DoD Architectures / Steven J. Ring and Dave Nicholson ..................................................................... 85 Chapter VI Business Process Modeling as a Blueprint for Enterprise Architecture / Joseph Barjis and Isaac Barjis ....................................................................................................... 114 Chapter VII Enterprise Architecture in the Singapore Government / Tan Eng Pheng and Gan Wei Boon ............ 129
Section II Governance and Management Chapter VIII Understanding and Communicating with Enterprise Architecture Users / Steven Thornton.............. 145 Chapter IX Improving Stakeholder Communications and IT Engagement: A Case Study Perspective / Gail L. Verley ......................................................................................... 160 Chapter X The Role of Change Management in IT Systems Implementation / Ron S. Kenett and Sebastiano Lombardo....................................................................................... 172 Chapter XI Managing Enterprise Architecture Change / Tim ONeill, Mark Denford, John Leaney, and Kyle Dunsire ..................................................................................................... 192
Section III Transformation and Value Realization Chapter XII Architecture-Driven Business Transformation / Chris Lawrence....................................................... 207 Chapter XIII Maturity of IT-Business Alignment: An Assessment Tool / Nel Wognum and Fan Ip-Shing ............. 221 Chapter XIV The Integrated Enterprise Life Cycle: Enterprise Architecture, Investment Management, and System Development / Frank J. Armour, Chris Emery, Jonathan Houk, Stephen H. Kaisler, and John S. Kirk..................... 237 Chapter XV Promoting Netcentricity through the Use of Enterprise Architecture / Supriya Ghosh ...................... 253
Section IV Implementation and Deployment Chapter XVI Enterprise Architecture as an Enabler for E-Governance: An Indian Perspective / Raghunath Mahapatra and Sinnakkrishnan Perumal ................................................................... 272
Chapter XVII Federated Enterprise Resource Planning Systems / Nico Brehm, Daniel Lbke, and Jorge Marx Gmez ..................................................................... 290 Chapter XVIII A Network-Based View of Enterprise Architecture / Bala Iyer, David Dreyfus, and Per Gyllstrom ................................................................................ 306 Chapter XIX Enterprise Architecture by a Small Unit in a Federated Organization / Roger Sliva .......................... 320 Chapter XX The Syngenta Architecture Story / Peter Hungerford ........................................................................ 331 Chapter XXI The Use of GERAM for Design of a Virtual Enterprise for a Ship Maintenance Consortium / John Mo ................................................................................................... 351 Chapter XXII Information Systems Architecture for Business Process Modeling / Michel Spadoni and Anis Abdmouleh ............................................................................................ 366
Section V Technology and Service-Oriented Architecture Chapter XXIII Enterprise Architecture within the Service-Oriented Enterprise / Scott J. Dowell ............................. 382 Chapter XXIV A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster / Zachary B. Wheeler ............................................................................ 400 Chapter XXV Business Networking with Web Services: Supporting the Full Life Cycle of Business Collaborations / Diogo R. Ferreira ............................... 419 Chapter XXVI Enterprise Integration Architecture for Harmonized Messaging / Dat C. Ma, Belinda M. Carter, Shazia W. Sadiq, and Maria E. Orlowska .................................... 434
Section I Frameworks and Methodologies Chapter I A Synergistic Assessment of the Federal Enterprise Architecture Framework against GERAM (ISO15704:2000) / Pallab Saha .............................................................. 1 The federal enterprise architecture framework (FEAF) is perhaps the most adopted EA framework, especially within the U.S. Government agencies. Either FEAF has been adopted as-is or other frameworks derived from FEAF have been used. FEAF today continues to be the most comprehensive framework available for guidance by agencies. It consists of a full-fledged methodology, several reference models, target architectures, and even a toolkit that facilitates adoption across all agencies. Chapter I evaluates synergies between the comprehensive FEAF against the Generalized Enterprise Reference Architecture and Methodology (GERAM) framework. The chapter discusses the level of completeness in the FEAF based on GERAM requirements and additionally areas where the FEAF goes well beyond GERAM requirements. Chapter II Extreme Architecture Framework: A Minimalist Framework for Modern Times / Phil Robinson and Floris Gout ......................................................................................................... 18 Enterprise architecture is a non-trivial initiative. Organizations usually face difficulty in understanding which of the organization elements they need to be aware of and which of them would be relevant to CIOs and IT managers. Chapter II presents an EA framework that is lightweight and selective to meet
the needs of the organization. The chapter uses the agile approach to develop architectural artifacts. It starts with the need for frameworks and some of the currently popular frameworks. Then it argues why interoperability both at systems and human level is critical followed by a discussion on the relevant architectural views that is derived from the XAF matrix and elements that need to be created. The chapter concludes with a comparison of the proposed framework with other established frameworks from the point of view of simplicity and ease of use. Chapter III Discovering and Modelling Enterprise Engineering Project Processes / Ovidiu Noran .................................................................................................................................... 39 Organizations are usually unclear about the activities and deliverables of an EA program. This situation is further exacerbated by the fact that some of the more popular and emerging architecture frameworks tend to be proprietary. There are open frameworks that often provide a long list of artifacts that are required as part of EA, but do not make any mention under what circumstances, which artifacts are relevant. Chapter III provides a meta-methodology based on existing architecture frameworks that facilitates organizations assess and select architectural elements and artifacts within the context of specific EA program requirements. The proposed approach in the chapter allows organizations to configure their EA programme, instead of doing the whole nine yards for every situation. The chapter illustrates the proposed approach with a real-life case study. Chapter IV Enterprise Architecture Framework for Agile and Interoperable Virtual Enterprises / Tae-Young Kim, Sunjae Lee, Jeong-Soo Lee, Kwangsoo Kim, and Cheol-Han Kim ........................ 62 With the intent of being more competitive and agile, organizations are now collaborating at the level of value chains. This entails end-to-end business processes that span multiple organizations. This move toward a new operating model is giving rise to the concept of virtual enterprises (VE). Given the absence of any current architecture methodology, Chapter IV presents a modeling framework that business architects and domain specialists can use to build and configure architectural elements and models specifically for VEs. The chapter uses and improves upon existing modeling standards and practices (like BPMN, UML, MDA) and applies concepts of service-oriented architecture (SOA) to make organizations more responsive to change.
Chapter V Activity-Based Methodolgy for Development and Analysis of Integrated DoD Architectures / Steven J. Ring and Dave Nicholson ..................................................................... 85 The Department of Defense Architecture Framework (DODAF) provides guidelines to DOD commands, services, and agencies in developing their EA both for war fighting operations and business processes. The DODAF is a structured approach that defines architecture views, perspectives, artifacts, reference models, and deliverables. Chapter V presents the DOD defined methodology that uses DODAF to create architecture outputs. Activity-based methodology (ABM) discussed in this chapter is presented as a
step-by-step approach that allows a common reference point for all architectural assets in terms of scope, breadth, depth, and intensity. Several DOD entities have adopted or are in the process of adopting ABM, thereby providing credence to its applicability in practice. Chapter VI Business Process Modeling as a Blueprint for Enterprise Architecture / Joseph Barjis and Isaac Barjis ....................................................................................................... 114 Business architecture is a key component of EA and without doubt drives the rest of the sub-architectures. Target business architecture definition typically consists of target outcomes (i.e., business metrics representing the ends) and target business processes (i.e., representing the means). Thus, process modeling is a critical activity in developing business architecture. Chapter VI presents a Petri-net based methodology, transaction-oriented Petri-nets (TOP) to enterprise process modeling. The chapter starts with a brief background of existing architecture frameworks and discusses the role of business architecture. Then it presents the details of the TOP notation, following which the complete TOP methodology framework is discussed in a step-by-step manner, with examples provided to illustrate each step and their respective output. Chapter VII Enterprise Architecture in the Singapore Government / Tan Eng Pheng and Gan Wei Boon ............ 129 In almost all countries, government is the biggest organization. This is associated with multiplicity of factors that add to the complexity of the operations of any government. Singapore has traditionally ranked very high on e-government readiness and usually within the global top 5. Chapter VII is a discussion of the role of enterprise architecture in the Singapores e-government programmes. The chapter discusses the evolution of the countrys e-government action plans and policies and examines the linkages and roles that EA plays including IT governance and investment planning. The chapter briefly presents the currently ongoing efforts within the government to define reference models that are intended for use by agencies to develop their own EA in alignment with the overall government-wide EA. Within the current e-government plan, the iGOV 2010, EA is one the three key pillars of programme success.
Section II Governance and Management Chapter VIII Understanding and Communicating with Enterprise Architecture Users / Steven Thornton.............. 145 One of the critical success factors in EA programmes is the need to disseminate the EA blueprint within the enterprise. Often EA blueprints are defined and developed by corporate IT departments, but the same is not adequately communicated to the rest of the organization. This creates problems in governing the architecture with the individual locations and business units typically failing to appreciate the need for an organization-wide EA and the need to comply with the same. Chapter VIII discusses current best practices and provides guidelines in communicating EA to the users. The recommended approaches
and practices presented in the chapter are derived from the United States National Institutes of Health (NIH) EA programmes. The intent of this chapter is to educate CIOs and chief architects about the need to communicate EA, recommended approaches, and its key benefits to the EA programme. Chapter IX Improving Stakeholder Communications and IT Engagement: A Case Study Perspective / Gail L. Verley ......................................................................................... 160 Chapter IX continues on the theme of architecture governance and management. This chapter begins with a discussion on the need to improve stakeholder communications and enhance engagement with the users in an EA programme. The chapter presents five steps to involve stakeholders in EA programmes, followed by ten strategies and mechanisms to institutionalize stakeholder involvement. The application of the steps, strategies, and mechanisms presented in the chapter are illustrated through a detailed case study of United States Federal Deposit Insurance Corporation (FDIC). The chapter concludes with a set of lessons learned that organizations can refer to. Chapter X The Role of Change Mangement in IT Systems Implementation / Ron S. Kenett and Sebastiano Lombardo....................................................................................... 172 Often IT systems implementations fail to adequately account for transition management. Given the fact that enterprise systems inevitably lead to redesign and digitization of business processes and associated business rules, it has the capability to trigger large-scale organizational change. As a result, IT implementation programmes must incorporate transition management as a key activity often as a critical success factor. Chapter X presents an integrated holistic approach to IT systems implementation called the better enterprise systems implementation (BEST). The chapter treats IT systems implementation as an organizational development issue and positions the BEST methodology as an approach to manage IT driven organizational change. The chapter then illustrates the application of the methodology through three case studies in Norway and Israel. Chapter XI Managing Enterprise Architecture Change / Tim ONeill, Mark Denford, John Leaney, and Kyle Dunsire ..................................................................................................... 192 Chapter XI is a description of an approach that allows organizations to simulate, predict, and control the emergent properties of enterprise systems from an architectural perspective. The chapter argues that existing methodologies and toolsets are by nature bottom-up and often fail to take into consideration the non-functional requirements of the IT systems from an architectural viewpoint. The chapter begins with a brief discussion of the key non-functional requirements that most IT systems are expected to fulfill. It then presents a five-step methodology that organizations can use to build and evolve their architectures. The chapter concludes with the benefits of the proposed methodology.
Section III Transformation and Value Realization Chapter XII Architecture-Driven Business Transformation / Chris Lawrence....................................................... 207 Chapter XII presents an approach where EA is viewed as a business issue. The chapter starts with a discussion on business transformation that is triggered through EA. The chapter argues that EA is an imperative irrespective of the business condition that an organization might be in and places forth business diagnostics as a key element of any architectural initiative. The chapter illustrates the application of the proposed approach in a financial services organization and discusses business process driven business transformation. The chapter then concludes with a discussion on non-process driven business transformation and why process architecture-based transformation was used as an example. Chapter XIII Maturity of IT-Business Alignment: An Assessment Tool / Nel Wognum and Fan Ip-Shing ............. 221 Most large IT system implementation initiatives are plagued by several factors that often make implementations less than desirable. While factors leading to failure for large IT implementations have been documented and analyzed, the intriguing issue is that organizations seem to repeat the same mistakes over and over again. This necessitates the need for a mechanism that allows planners and managers to evaluate the start-up situation in such projects, including capturing the project dynamics in a coherent manner. Chapter XIII presents such an approach based on better enterprise systems implementation (BEST). In doing this, the two key questions addressed are what problems can be pre-empted and what can be done about them. The chapter then continues to illustrate the proposed approach through several mini-cases derived out of real-life scenarios. The chapter concludes with a discussion on areas for further research. Chapter XIV The Integrated Enterprise Life Cycle: Enterprise Architecture, Investment Management, and System Development / Frank J. Armour, Chris Emery, Jonathan Houk, Stephen H. Kaisler, and John S. Kirk............... 237 Organizations typically tend to consider and implement EA in isolation. However, in reality, EA has the capability to impact several other activities within the enterprise. Chapter XIV explores and discusses the linkages that EA has with IT investment management and system development processes and hence the need for a holistic approach. In doing so, it proposes an integrated enterprise lifecycle (IELC). The chapter starts with a discussion of the IELC and its various components. The chapter positions IELC as a key IT governance mechanism and presents several governance archetypes that are part of the IELC. It concludes with a brief discussion on the proposed move towards IELC by the U.S. Office of Management and Budget (OMB) and U.S. General Accounting Office (GAO) under the Federal Enterprise Architecture (FEA) program.
Chapter XV Promoting Netcentricity through the Use of Enterprise Architecture / Supriya Ghosh ...................... 253 Chapter XV presents U.S. Department of Defense (DOD)s goal of net-centric transformation as an implementation of EA. The chapter argues that to achieve net-centricity, the existence of an integrated architecture provided by the DOD global information Grid (GIG) is a key imperative. The chapter then provides an overview of the key performance parameters to support net readiness (NR-KPP). It details the adoption of net-centric transformation through the use of net-centric data strategy, net-centric IA strategy, service-oriented architecture (SOA), and communications transport strategy. The chapter concludes with a discussion on upcoming and future trends to enable DODs move towards net-centricity.
Section IV Implementation and Deployment Chapter XVI Enterprise Architecture as a Enabler for E-Governance: An Indian Perspective / Raghunath Mahapatra and Sinnakkrishnan Perumal ................................................................... 272 Chapter XVI is a case study on application of EA to develop an efficient and effective e-governance system for citizen services administration by the Government of India. The chapter starts with a background on various e-government initiatives, including a brief discussion on the administrative structure in India. The chapter then puts forth key imperatives that are required for successful e-government programs keeping in mind the Indian context. EA is then presented as one the critical success factors. The chapter continues with a detailed discussion of a proposed framework (derived from the Zachman framework) that facilitates the application of EA in the context of e-government in India. The chapter concludes with a mapping of the earlier presented imperatives to the key elements of the proposed framework. Chapter XVII Federated Enterprise Resource Planning Systems / Nico Brehm, Daniel Lbke, and Jorge Marx Gmez ..................................................................... 290 Chapter XVII presents enterprise resource planning (ERP) system architecture that makes individual business modules reusable through the use of Web services-based shared and non-monolithic architecture. The chapter is based on a practical challenge that enterprises currently face, wherein systems (especially the ERP tools) have proprietary data models, thus limiting their usage and in conflict to their claim of being positioned as enterprise systems. This leads to vendor lock-in. The chapter begins with a background on existing ERP systems with a discussion of their limitations as real enterprise systems. The chapter then presents the federated ERP system approach and discusses how the federated approach addresses the shortcomings of existing siloed ERP systems. The chapter concludes with a discussion on the kind of adoption challenges that the federated approach might face along with a short brief on future trends and research.
Chapter XVIII A Network-Based View of Enterprise Architecture / Bala Iyer, David Dreyfus, and Per Gyllstrom ................................................................................ 306 This chapter moves away from the traditional four sub-architecture-based view of EA and takes a networkbased view that is based on understanding and capturing the dependencies between the elements of the EA. The proposed approach asserts that such dependencies are a factor of time and typically emerge as the architecture evolves. Dependencies that emerge during the design, deployment, and operations of the EA are based on both technical and social factors. The chapter presents a case study of the application of the proposed approach in a financial services company. The chapter concludes with a discussion of the limitations of the proposed approach and presents pointers to how the limitations can be addressed. Chapter XIX Enterprise Architecture by a Small Unit in a Federated Organization / Roger Sliva .......................... 320 Typically, EA programmes tend to consist of large teams that develop and implement the target architecture for a single organization or company. Chapter XIX presents experiences and best practices in developing EA by a small team for a federated organization. A federated structure is typical in many governments where the administrative structure is organized into national/federal entities followed by states, districts, or provinces. Given the federated structure, developing EA presents several practical challenges. The chapter discusses factors to be considered in such a scenario when developing EA in terms of scope, intensity, use of tools, open standards, shared business services and programme governance. Chapter XX The Syngenta Architecture Story / Peter Hungerford ........................................................................ 331 Chapter XX presents the experiences of development and evolution of EA at Syngenta. The key drivers in Syngentas architecture programme are business efficiency, growth, and innovation. The chapter shares the experiences and insights from several business areas. The case studies presented in the chapter include EA initiatives like server rationalization and development of global infrastructure services, integrated go-to-market platform, providing an unified research platform, and building an enterprisewide business intelligence. The chapter then presents a simple framework for EA and discusses the case studies in the context of the framework. The chapter concludes with future trends and discusses a few plausible areas of research. Chapter XXI The Use of GERAM for Design of a Virtual Enterprise for a Ship Maintenance Consortium / John Mo ................................................................................................... 351 Chapter XXI describes the application of the generalized enterprise reference architecture and methodology (GERAM) in analyzing the ANZAC ship alliance (ASA). The chapter discusses the details of the use of GERA in developing and studying a virtual enterprise, especially issues relating to logistics and information architecture management needed to support the operations of ASA as a virtual enterprise. The chapter starts with a brief overview of the GERAM including the key reasons of why it was selected
for use. The chapter then describes ASA as a virtual enterprise including the peculiarities and nuances of a virtual enterprise. The chapter concludes with a description of enterprise engineering programme at ASA, the artifacts, and models developed based on GERAM requirements. Chapter XXII Information Systems Architecture for Business Process Modeling / Michel Spadoni and Anis Abdmouleh ............................................................................................ 366 Chapter XXII is a description of business process modeling capabilities within the CIMOSA application server (CAS). The CAS is an information system for enterprise modeling and designing. The chapter starts with a brief overview of the problems that are faced by organizations in integrating their disparate systems. Then it describes the CAS project, its goals and objectives, and the primary reason for selecting CIMOSA as the reference architecture. Following this, the chapter describes the CIMOSA modeling framework and conceptual model. The chapter then describes the business process modeling aspects with an example of a manufacturing organization including the views and artifacts needed to support the requirements of enterprise systems. . Chapter XXIII Enterprise Architecture within the Service-Oriented Enterprise / Scott J. Dowell ............................. 382 Chapter XXIII elaborates the role of EA in a service-oriented enterprise (SOE). Driven by the need to be adaptable, agile, and responsive to change, organizations are now adopting the SOE paradigm where organizations view themselves as a bundle of services that are available for use through technology enablement. The chapter begins with the issues that enterprise architects need to grapple with, namely, business services, service-oriented solutions, infrastructure services, and IT organization changes. It goes on to compare a traditional enterprise with a SOE. The chapter then discusses the development of strategy in a SOE and its peculiarities. The chapter provides real-life examples on various aspects of service orientation adopted by various organizations. Chapter XXIV A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster / Zachary B. Wheeler ............................................................................ 400 Chapter XXIV is a case study of the re-establishment of EA for the local government following Hurricane Katrina in Louisiana. The chapter presents an approach to address areas in EA that have not received much attention as part of preparedness, response, and recovery phases. The chapter proposes the use of service-oriented architecture (SOA) paradigm to address some of the key issues. The chapter starts with a brief background of the underlying EA framework that was used in the given situation, followed by a detailed description of the conceptual data model and how a critical portion of the EA was developed. The chapter concludes with a discussion on other technologies that can be used to extend the current solution.
Chapter XXV Business Networking with Web Services: Supporting the Full Life Cycle of Business Collaborations / Diogo R. Ferreira ............................... 419 Integration technologies to support and enable business-to-business collaborations have been around for some time now. However, all existing approaches overly focus on the operational transaction portion of the overall collaboration mechanism. Chapter XXV proposes to use the Web services paradigm as a way to deal with all aspects of business collaborations. The chapter starts with an overview of Web services as an integration platform, followed by a description of the criticality of the life cycle approach in integration. The chapter demonstrates with examples the use of Web services in extending its support of operational aspects alone to the full life cycle of business collaborations, thereby enabling seamless e-business collaborations and trading. Chapter XXVI Enterprise Integration Architecture for Harmonized Messaging / Dat Cao Ma, Belinda Carter, Shazia W. Sadiq, and Maria E. Orlowska ...................................... 434 Most organizations are now characterized by end-to-end cross enterprise business processes that aim to enable value chain integration. Although organizations recognize the need for integration both at the business process and at the system level, very few utilize formal approaches in designing and implementing business rules that are needed to govern cross-enterprise processes. The criticality of the managing business rules in cross enterprise business processes is further driven by the fact that business partners tend to have their own agendas and goals in partnering. Chapter XXVI presents a rule-based enterprise integration approach enabled through messaging technology. The chapter begins with the challenges of large-scale collaborative systems and the evolution of technology solutions to address some of the challenges. The chapter then presents the proposed enterprise integration architecture and an overview of related technologies. Following this, the chapter elaborates the steps in rule design, validation, and deployment and its adoption within the proposed integration architecture. The chapter concludes with a discussion on future developments in the proposed area.
xv
Foreword
Historically, enterprise architecture has been a non-issue because in the industrial age, it was the industrial products that were growing in complexity and changing and the concept of the enterprise was relatively simple: create a good product and then find a lot of people to sell it to. As we approximate the realities of information age, major changes are taking place in the global marketplace. It is the enterprise that is growing in complexity and the enterprise that is changing. No longer is business as simple as get yourself a good product and then find a lot of customers to sell it to. That is, historically, from the perspective of the enterprise, the market (the customers) is integrated. Increasingly, the concept is, find yourself a good customer and then you (the enterprise) identify the range of products (or services) required to keep that customer a good customer. That is, from the perspective of the customer, the product and/or the enterprise must be integrated to the customers requirement. If the enterprise has to treat each customer as a unique requirement and customize every product or service of the enterprise to the perspective of each customer, it will drive the complexity of the enterprise out of sight and I would suggest that this information age characteristic is quite independent of whether it is the enterprise or the enterprises product or whether the enterprise is public sector or private sector or how big or small the enterprise is. Integration is where the complexity lies. Increasingly, all the parts of the enterprise have to be engineered to fit together to the specification of the customer enterprise-wide. Furthermore, to create complex industrial products that are economically viable, as many parts as possible must be engineered as standard, interchangeable parts, reusable, or normalized. That is, in the information age, the enterprise is going to have to be engineered such that all of the parts fit together enterprise-wide and that everything possible is engineered to be standard and interchangeable (reusable) and that, in order to be lean, no concept should recur, (everything (not only the data) will have to be normalized). A second characteristic of the changing global marketplace is dramatic escalation of the rate of change. The way that dramatic escalation of the rate of change affects products (or enterprises) is in reducing the time-to-market, that is, reducing the time it takes from the point in time an order is placed for a new product until a finished good is produced, in the case of enterprises until a new enterprise-wide, integrated, implemented enterprise, is produced. The information age customer demand is for custom products (integrated to the specification of the customer requirement), mass-produced in quantities of one for immediate delivery, that is, a time-to-market of virtually zero. You might recognize this as the present definition of mass-customization. In short, the known characteristics of the information age are extreme complexity and dramatic escalation of the rate of change. There is a plethora of business and academic literature that argues this case. A survey of 7,000 years of history of human kind would conclude that the only known strategy for accommodating extreme complexity and high rates of change is architecture. If you cant describe something, you cant create it, whether it is an airplane, a hundred storey building, a computer, an automobile or an enterprise. Once you get a complex product created and you want to change it, the basis for change is its descriptive representations. I would suggest that architecture is the total set of descrip-
xvi
tive representations relevant for describing something, anything complex you want to create, which serves as the baseline for change if you ever want to change the thing you have created. You dont need architecture if you want to create a simple object. For example, if all you want is a log cabin, chop down trees and build a log cabin. You dont need architecture. You can see and understand everything all at the same time. On the other hand, if you want a hundred storey building, you cannot see and understand everything all at the same time and you are going to have to have architecture and the architectural representations will be the basis for changing it once it is built. If you want to reduce the time-to-market for creating a complex product, you could engineer the parts, prefabricate them, have them in inventory long before you ever get the order. Then you could reduce the time to market to just the time it takes to assemble the product. If you cleverly engineered the parts such that they could be assembled into more than one finished good, you could build a virtually infinite number of custom finished goods from the same set of prefabricated parts. In other words, you could manufacture custom products, massproduced in quantities of one for immediate delivery. I might observe that although there is no manufacturer that has completely perfected the concepts of mass-customization, the Japanese taught the western manufactures a lot of hard lessons in the last 25 or 30 years and anymore, to get into or stay in a complex industrial product manufacturing business, mass-customization is fundamental and integral to survival. Clearly, my argument is, we will have to apply the same kind of concepts to the enterprise in the information age that we have applied to the industrial products of the industrial age. We will have to produce different, custom manifestations (or implementations) of the enterprise, enterprise-wide, on demand. By mixing the metaphor (industrial products and enterprises), I have tried to encapsulate in a few short paragraphs the underlying argument for enterprise architecture. In the information age, I am quite certain that the question to the enterprise is, how do you intend to deal with extreme complexity and dramatic escalation of the rate of change? I would submit, if the enterprise does not have an enterprise architecture strategy, they are neither going to accommodate extreme complexity nor the escalating rate of change and therefore, I would suggest, it is questionable whether they are going to be able to exist. My opinion is enterprise architecture is the most profound, significant, issue of the information age. The next question is, what is enterprise architecture, what does it look like? We know what architecture is for airplanes. We know what architecture is for buildings. We know what architecture is for computers. We know what architecture is for industrial products because in the industrial age, it was the industrial product that was increasing in complexity and changing. If we hadnt figured out what architecture is for industrial products, we would not have Boeing 747s (airplanes), hundred storey buildings, computers, ocean liners, or Acura Legends (automobiles). We would not have complex industrial products. An observation of architecture for industrial products shows that architecture is architecture is architecture. All industrial products have bills-of-materials. They all have functional specs, they all have drawings, they all of operating instructions, they all have timing diagrams, and they all have engineering design objectives. Each of these sets of descriptions is completely different and varies independently from one another. However, they are all related to one another. Generically, they describe WHAT the product is made of, HOW the product works, WHERE the components are located, WHO is responsible for operation, WHEN do things happen, and WHY do they happen. This classification of descriptive representations has been employed by humanity for thousands of years. It is universal. There is another dimension of classification of descriptions that have to do with the audiences for which the descriptions are prepared and employed. Very complex products will have some scoping or bounding expression for the originators. They all have concept definitions (requirements) for the end owners. They all have logic representations (schematics) for the designers. They all have technology constructs (blueprints) for the builders. They all have production tool configurations for the implementers. These two classifications for descriptive representations are orthogonal and constitute a structured order or schema for descriptions, that is, a framework for architecture, which classifies and defines the set of descriptive representations for anything.
xvii
I spent something over 40 years of my professional life trying to find an answer to the question, What does architecture look like for enterprises? If I have done anything of any value, my contribution has been in the form of a framework, a framework for enterprise architecture, which simply puts some definition around the set of descriptive representations that are relevant for describing enterprises. Anyone who has followed my work would recognize my framework in the previous description of the architecture schema. I simply put enterprise names on the same engineering design artifacts that constitute architecture for industrial products. In 2006, the time of writing this foreword, we do not have experience with producing all of the descriptions (models) for an enterprise that are prescribed by this framework, in fact, we dont even have formalisms for many of them. There is a lot of room for creativity, research and development, and collaboration. Which brings me to Pallab Sahas book this is a very timely and important book. Pallab Saha has assembled substantive discussions about all of the known architecture-related subjects of which we are aware at the moment. The subjects are wide and varied and clearly, there is a lot of creativity and work that needs to be done. I do not think that we will have several hundred years to accumulate experience, develop formalisms, and do all the architectural instantiations that will be required to operate enterprises in the information age. In fact, we may only have several decades to make major progress because at the point in time that the enterprise finds itself in extremis, unable to accommodate any more complexity and unable to cope with the escalating rate of change, that is, at the point in time the enterprise discovers it is imperative to have enterprise architecture to survive, it is going to be to late to start working on it. Pallabs book is timely because tomorrow morning is not too early to start working on enterprise architecture! I hope Pallab Saha starts working on the next book immediately. The next book must integrate and normalize all the subjects of the first book. He would likely find my framework for enterprise architecture helpful if he actually undertook this next endeavor. However, the present book is a good place to start. It is a book that not only systems people should read, but enterprise business people should read as well. In fact, I hope in my brief foreword, I have sufficiently argued that enterprise architecture is an ENTERPRISE issue, not simply a systems issue. Maybe, by the time the next book is ready for publication, the urgency of complexity and change will be so apparent to the business world, they will be more prepared to read it. John A. Zachman Glendale, California 2006
John A. Zachman is the originator of the Framework for Enterprise Architecture, which has received broad acceptance around the world as an integrative framework, or periodic table of descriptive representations for enterprises. Dr. Zachman is not only known for his work on this book, but is also known for his early contributions to IBMs information strategy methodology (business systems planning) as well as to their executive team planning techniques (intensive planning). Dr. Zachman retired from IBM in 1990, having served them for 26 years. He is chief executive officer of the Zachman Institute for Framework Advancement (ZIFA), an organization dedicated to advancing the conceptual and implementation states of the art in enterprise architecture. Dr. Zachman serves on the executive council for information management and technology of the United States General Accounting Office. He is a fellow for the College of Business Administration of the University of North Texas. He serves on the advisory board for the Data Resource Management Program at the University of Washington and on the advisory board of the Data Administration Management Association International (DAMA-I) from whom he was awarded the 2002 Lifetime Achievement Award. He was awarded the 2004 Oakland University, Applied Technology in Business (ATIB), and the Award for IS Excellence and Innovation. Dr. Zachman has been focusing on enterprise architecture since 1970 and has written extensively on the subject. He is the author of the e-book. The Zachman Framework for Enterprise Architecture: A Primer on Enterprise Engineering and Manufacturing. He has facilitated innumerable executive team planning sessions. He travels nationally and internationally, teaching and consulting, and is a popular conference speaker known for his motivating messages on enterprise architecture issues. He has spoken to many thousands of enterprise managers and information professionals on every continent. Prior to joining IBM, Dr. Zachman served as a line officer in the United States Navy and is a retired Commander in the U.S. Naval Reserve. He chaired a panel on Planning, Development, and Maintenance Tools and Methods Integration for the U.S. National Institute of Standards and Technology. He holds a degree in chemistry from Northwestern University, has taught at Tufts University, has served on the board of councilors for the School of Library and Information Management at the University of
xviii
Southern California as a special advisor to the School of Library and Information Management at Emporia State University, and on the advisory council to the School of Library and Information Management at Dominican University.
*** I congratulate Dr. Pallab Saha and the authors who have contributed to the Handbook of Enterprise Systems Architecture in Practice. This book covers a wide range of enterprise architecture (EA) issues in a way that reflects many aspects of a global EA discussion that has been going on for nearly 20 years. You will find some variance in the approach and lexicon that contributing authors use in many of the chapters, but you will also find a number of common threads that are an indication of both the richness and diversity of thought in the EA community and of the continuing maturity of EA as a management best practice and a career field for business and technology professionals. As such, the Handbook of Enterprise Systems Architecture in Practice is a valuable addition to the reading list of executives, managers, and staff in business, government, and other sectors who seek to keep their enterprises agile and efficient as they manage change, implement new business processes and supporting technologies, and pursue important strategic goals. EA is distinguished from, and yet encompasses, other forms of business, service, systems, data, and technology architecture. EA seeks to be the over-arching framework and methodology for integrating strategic, business, and technology planning across the entire enterprise. In so doing, EA claims to be the highest level of all meta-concepts that guide the analysis, design, and ongoing improvement of enterprises in the public, private, military, academic, and non-profit sectors. This expanded claim arises not from ego, but from necessity, as CEOs, CFOs, CIOs, and COOs seek new ways to envision and transform the enterprises they lead. Architectures exist in the mind of every executive and manager, yet these architectures are mostly held within, as executives are not familiar with EA methods and frameworks that offer ways to take abstract mental images and transform them into a sharable model of the enterprise. The CEO is the ultimate owner of the EA, yet that too is not fully realized. When it is, EA will further contribute to the ongoing success of enterprises in all sectors. This book presents over two dozen articles by leading authors, researchers, and practitioners, who cover various aspects of implementing systems architecture in the context of solving enterprise-level business problems. The approach to EA that I have written about previously centers on a framework with five hierarchical levels (strategic goals, business services, information flows, systems, and infrastructure) and three threads that pervade all levels of the architecture (security, standards, and training). In teaching this and other approaches to EA, I have had the privilege of helping to create several training programs and have delivered EA courses and seminars all over the world. To convey the essential and unique aspects of EA as it is most effectively practiced, I start my lectures with a simple equation: EA = S+B+T that stands for EA equals strategy + business + technology. This is meant to differentiate EA from early stand-alone forms of business architecture, data architecture, systems architecture, and network architecture all of which are active and relevant sub-architectures within an integrated EA. This equation also indicates that strategic priorities drive business requirements, which drive technology solutions including the design, implementation, and operation of information technology systems. EA is not just about technology, it is about designing and improving enterprises in all aspects, doing so through a repeatable and increasingly effective and mature methodology. My next lecture point is to usually say that a complete approach to EA must include an interlocking set of elements, including (1) a detailed step-by-step methodology for establishing the EA program and documenting current and future versions of the EA on an ongoing basis; (2) an analysis and documentation framework that establishes the scope and relationship of the EA; (3) a set of EA documentation artifacts (also known as work products) that cover all areas of the EA as defined by the framework; (4) the selection of a set of proven best practices for doing EA analysis, design, and documentation work, and which cover all areas of the framework; and (5) an online repository for archiving EA artifacts that incorporates automated documentation and analysis tools to the maximum extent possible. Unfortunately, many current approaches to EA do not have all of these elements, and/or the elements are not designed to work together. Examples include a lack of a complete set of
xix
artifacts to cover all areas of the EA framework; artifacts that are not derived from proven best practices, best practices that do not map to all levels of the framework, and a repository design that does not reflect the underlying analysis and design framework and is therefore difficult to understand, navigate, and use. I also point out how EA is but one of a number of areas of business and technology governance that must work together to be effective. These areas of governance include the decision-making processes, standards and policy for strategic planning, capital planning, enterprise architecture, workforce planning, program management, records management, security, systems development, and operations. The final lecture point that I usually present at the beginning of an EA seminar or class is to talk about five areas of value that EA creates for the enterprise: (1) increased alignment of business and technology programs with strategic goals; (2) increased business agility through improved decision-making and reduced cycle time in conducting workflow/dataflow/systems analysis, design, and implementation; (3) the ability to embark on business transformation initiatives and the improved management of change through the visualization of the entire enterprise in the strategic, business, and technology dimensions; (4) increased success in implementing or changing technologies that support key business processes and service/product delivery; and (5) increased ability to control otherwise escalating technology costs through the avoidance of duplication, and better matches between business requirements and technology solutions that extend across more lines of business. While these lecture points and lists are not all-inclusive, they hopefully address important points for students who are first being exposed to the multitude of concepts that EA encompasses. By being the meta-concept for enterprise analysis, design, and improvement, EA has become a rich, complex set of methods that must be effectively integrated and explained to those who sponsor and implement architectures in equally complex and dynamic enterprises. Fortunately, EA has itself become agile and purposeful as it matures and systems architecture is an essential part of this. Again, I congratulate Dr. Pallab and the other authors on the publication of this important contribution to the global EA discourse. I recently had the opportunity to talk with Dr. Pallab while on a teaching trip to Singapore and I can tell you that he not only understands all aspects of EA and systems architecture, but he is a thought leader in business and technology governance as well. His talk with my students about the integration of architecture and investment planning was very informative. I also know that many of the authors are active EA practitioners, teachers, researchers, or consultants and I especially value the opportunity that the Handbook of Enterprise Systems Architecture in Practice has given me to stay current in our evolving discipline through the sharing of their thoughts and best practices.
xx
Preface
I am not sure exactly when the importance of enterprise architecture (EA) dawned on me. What is clear is that it wasnt a one fine day realization, rather a result of numerous conversations with CIOs, IT managers, CFOs, process managers, and multiple research studies that convinced me that EA is perhaps the most important and the most misunderstood idea in information technology (IT) and a critical emerging discipline to elevate the role of IT organizations in enterprises. Metaphorically, an EA is to an organizations operations and systems as a set of blueprints is to a building. This handbook, unlike any other available today, aims: To provide a comprehensive and unified overview of practical aspects of EA. To integrate EA theory and concepts to field-tested methods, practical strategic issues, and implementation challenges. To illustrate development methods and the process cycle through case studies and detailed examples. To provide insights into the impact of effective EA on IT governance, IT portfolio management, IT risks, and IT outsourcing. To demonstrate the criticality of EA economics and its role in the strategic value of IT
This handbook is a compilation of 26 chapters on enterprise architecture written by practitioners and practicing academics from countries including Australia, France, Germany, India, Israel, Norway, Netherlands, Singapore, South Africa, South Korea, Switzerland, Portugal, United Kingdom, and the United States of America. The authors of these chapters were included in the review process in addition to having their submissions reviewed by a panel of independent reviewers. The handbook has been foreworded by John Zachman, the father of the Zachman Framework; undoubtedly the first formal framework in the discipline of EA and Dr. Scott Bernard, an accomplished EA practitioner who is now also an academic being associated with the Carnegie Mellon University. The chapters in the handbook have been selected with the intention to address professionals with a wide variety of interests and with different levels of EA knowledge. The handbook has a very strong practical orientation and is primarily targeted at: CIOs, IT/IS managers, architects, analysts, and designers seeking better, quicker, and easier approaches to respond to needs of their internal and external customers. Line-of-Business managers concerned with maximizing business value of IT and business competitiveness. CTOs of business software companies interested in incorporating EA to differentiate their products and services and increasing the value proposition to their customers. Consultants and practitioners desirous of new solutions and technologies to improve the productivity of their corporate clients. MIS and IT educators interested in imparting knowledge about this vital discipline. Researchers looking to uncover and characterize new research problems and programs. IT professionals involved with organizational technology strategic planning, technology procurement, management of technology projects, consulting and advising on technology issues, and management of total cost of IT ownership.
xxi
The handbook is structured logically into five parts. Section I on frameworks and methodologies focuses on approaches and mechanisms that organizations use to develop their architecture blueprints. Section II on governance and management shows how organizations initiate and sustain their EA practices. Section III provides insights into how organizations employ EA to drive their transformation programs, gain tighter business-IT alignment, and realize business value out of their IT investments. Section IV consists of descriptions of the adoption of EA in large and small organizations with insights on key practical challenges they face and how the whole EA programmes are sustained. Finally, Section V demonstrates the role of technology, especially service-oriented architecture (SOA) in EA implementation. Section I: Frameworks and Methodologies Section I is a collection of chapters describing approaches and methods used by organizations to plan and develop their EA blueprints. Chapter I: A Synergistic Assessment of the Federal Enterprise Architecture Framework against GERAM (ISO15704:2000), by Pallab Saha of the National University of Singapore, evaluates synergies between the comprehensive FEAF against the generalized enterprise reference architecture and methodology (GERAM) framework. The federal enterprise architecture framework (FEAF) is perhaps the most adopted EA framework, especially within the U.S. Government agencies. Either FEAF has been adopted as-is or other frameworks derived from FEAF have been used. FEAF today continues to be the most comprehensive framework available for guidance by agencies. It consists of a full-fledged methodology, several reference models, target architectures, and even a toolkit that facilitates adoption across all agencies. The chapter discusses the level of completeness in the FEAF based on GERAM requirements and additionally identifies areas where the FEAF goes well beyond GERAM requirements. Chapter II: Extreme Architecture Framework: A Minimalist Framework for Modern Times, by Phil Robinson of Lonsdale Systems, Australia and Floris Gout, an Independent Consultant based in Australia, presents an EA framework that is lightweight and selective to meet the needs of the organization. The chapter uses the agile approach to develop architectural artifacts. It starts with the need for frameworks and some of the currently popular frameworks. Then it argues why interoperability both at systems and human level is critical followed by a discussion on the relevant architectural views that is derived from the XAF matrix and elements that need to be created. The chapter concludes with a comparison of the proposed framework with other established frameworks from the point of view of simplicity and ease of use. Chapter III: Discovering and Modelling Enterprise Engineering Project Processes, by Ovidiu Noran from Griffith University, Australia, provides a meta-methodology based on existing architecture frameworks that facilitates organizations to assess and select architectural elements and artifacts within the context of specific EA program requirements. The proposed approach in the chapter allows organizations to configure their EA programme, instead of doing the whole nine yards for every situation. The chapter illustrates the proposed approach with a real-life case study. Chapter IV: Enterprise Architecture Framework for Agile and Interoperable Virtual Enterprises, by Tae-Young Kim, Sunjae Lee, Jeong-Soo Lee, and Kwangsoo Kim of the Pohang University of Science and Technology, South Korea and Cheol-Han Kim from Daejeon University, South Korea, presents a modeling framework that business architects and domain specialists can use to build and configure architectural elements and models specifically for virtual enterprises (VE). The chapter uses and improves upon existing modeling standards and practices (like BPMN, UML, MDA) and applies concepts of service-oriented architecture (SOA) to make organizations more responsive to change.
xxii
Chapter V: Activity-Based Methodology for Development and Analysis of Integrated DoD Architectures, by Steven J. Ring and Dave Nicholson from the MITRE Corporation, USA and Stanley Harris, Lockheed Martin Corporation, USA, presents the DOD defined methodology that uses DODAF to create architecture outputs. Activity-based methodology (ABM) discussed in this chapter is presented as a step-by-step approach that allows a common reference point for all architectural assets in terms of scope, breadth, depth and intensity. Several DOD entities have adopted or are in the process of adopting ABM, thereby providing credence to its applicability in practice. Chapter VI: Business Process Modeling as a Blueprint for Enterprise Architecture by Joseph Barjis of Georgia Southern University, USA and Isaac Barjis of City University of New York, USA, presents a Petri-netbased methodology, transaction-oriented Petri-nets (TOP), to enterprise process modeling. The chapter starts with a brief background of existing architecture frameworks and discusses the role of business architecture. Then it presents the details of the TOP notation, following which the complete TOP methodology framework is discussed in a step-by-step manner with examples provided to illustrate each step and their respective output. Chapter VII: Enterprise Architecture in the Singapore Government by Tan Eng Pheng and Gan Wei Boon from Infocomm Development Authority of Singapore, Singapore, is a discussion of the role of enterprise architecture in the Singapores e-government programmes. The chapter discusses the evolution of the countrys e-government action plans and policies and examines the linkages and role that EA plays including IT governance and investment planning. The chapter briefly presents the currently ongoing efforts within the government to define reference models that are intended for use by agencies to develop their own EA in alignment with the overall Government-wide EA. Within the current e-government plan, the iGOV 2010, EA is one the three key pillars of programme success. Section II: Governance and Management Section II of the handbook comprises of chapters that are useful to institute and sustain the EA practice within the organization. Chapter VIII: Understanding and Communicating with Enterprise Architecture Users, by Steven Thornton from the National Institutes of Health, USA, discusses current best practices and provides guidelines in communicating EA to the users. The recommended approaches and practices presented in the chapter are derived from the United States National Institutes of Health (NIH) EA programmes. The intent of this chapter is to educate CIOs and chief architects about the need to communicate EA, recommended approaches, and its key benefits to the EA programme. Chapter IX: Improving Stakeholder Communications and IT Engagement: A Case Study Perspective, by Gail L. Verley of the Federal Deposit Insurance Corporation, USA, continues on the theme of architecture governance and management. This chapter begins with a discussion on the need to improve stakeholder communications and enhance engagement with the users in an EA programme. The chapter presents five steps to involve stakeholders in EA programmes, followed by ten strategies and mechanisms to institutionalize stakeholder involvement. The application of the steps, strategies, and mechanisms presented in the chapter are illustrated through a detailed case study of United States Federal Deposit Insurance Corporation (FDIC). The chapter concludes with a set of lessons learned that organizations can refer to. Chapter X: The Role of Change Management in IT Systems Implementation, by Ron S. Kenett of KPA Limited, Israel and Sebastiano Lombardo from the Foundation for Scientific and Industrial Research at the Norwegian Institute of Technology (NTH), Norway, presents an integrated holistic approach to IT systems implementation called the better enterprise systems implementation (BEST). The chapter treats IT systems implementation as an organizational development issue and positions the BEST methodology as an approach to manage IT driven organizational change. The chapter then illustrates the application of the methodology through three case studies in Norway and Israel. Chapter XI: Managing Enterprise Architecture Change, by Tim ONeill, Mark Denford, and John Leaney of the University of Technology Sydney, Australia and Kyle Dunsire from Avolution Pty. Limited, Australia,
xxiii
is a description of an approach that allows organizations to simulate, predict, and control the emergent properties of enterprise systems from an architectural perspective. The chapter argues that existing methodologies and toolsets are by nature bottom-up and often fail to take into consideration the non-functional requirements of the IT systems from an architectural viewpoint. The chapter begins with a brief discussion of the key nonfunctional requirements that most IT systems are expected to fulfill. It then presents a five-step methodology that organizations can use to build and evolve their architectures. The chapter concludes with the benefits of the proposed methodology. Section III: Transformation and Value Realization This section of the handbook focuses on how organizations use EA to facilitate and drive their organizational transformation objectives seeking to enhance alignment between their business and IT functions. Business value of IT being a key point in todays IT organizations is covered in this part by way of how EA is used to realize economic value. Chapter XII: Architecture Driven Business Transformation, by Chris Lawrence of Old Mutual South Africa, South Africa, presents an approach where EA is viewed as a business issue. The chapter starts with a discussion on business transformation that is triggered through EA. The chapter argues that EA is an imperative irrespective of the business condition that an organization might be in and places forth business diagnostics as a key element of any architectural initiative. The chapter illustrates the application of the proposed approach in a financial services organization and discusses process driven business transformation. The chapter then concludes with a discussion on non-process driven business transformation and why process architecture based transformation was used as an example. Chapter XIII: Maturity of IT-Business Alignment: An Assessment Tool, by Nel Wognum of the University of Twente, The Netherlands and Fan Ip-Shing from Cranfield University, United Kingdom, presents such an approach based on better enterprise systems implementation (BEST). In doing this, the two key questions addressed are what problems can be pre-empted and what can be done about them. The chapter then continues to illustrate the proposed approach through several mini-cases derived out of real-life scenarios. The chapter concludes with a discussion on areas for further research. Most large IT system implementation initiatives are plagued by several factors that often make implementations less than desirable. While factors leading to failure for large IT implementations have been documented and analyzed, the intriguing issue is that organizations seem to repeat the same mistakes over and over again. This necessitates the need for a mechanism that allows planners and managers to evaluate the start-up situation in such projects, including capturing the project dynamics in a coherent manner. Chapter XIV: The Integrated Enterprise Life Cycle: Enterprise Architecture, Investment Management, and System Development, by Frank J. Armour from Armour LLC, USA, Chris Emery and Jonathan Houk of the U.S. Architect of Capitol, USA, Stephen H. Kaisler from SET Associates, USA, and John S. Stan Kirk from the U.S. National Science Foundation, USA, explores and discusses the linkages that EA has with IT investment management and system development processes and hence the need for a holistic approach. In doing so, it proposes an integrated enterprise life cycle (IELC). The chapter starts with a discussion of the IELC and its various components. The chapter positions IELC as a key IT governance mechanism and presents several governance archetypes that are part of the IELC. The chapter concludes with a brief discussion on the proposed move towards IELC by the U.S. Office of Management and Budget (OMB) and U.S. General Accounting Office (GAO) under the Federal Enterprise Architecture (FEA) program. Chapter XV: Promoting Netcentricity through the Use of Enterprise Architecture, by Supriya Ghosh from Lockheed Martin Corporation, USA, presents U.S. Department of Defense (DOD)s goal of net-centric transformation as an implementation of EA. The chapter argues that to achieve net-centricity the existence of an integrated architecture provided by the DOD Global Information Grid (GIG) is a key imperative. The chapter then provides an overview of the key performance parameters to support net readiness. It details the adoption of net-centric transformation through the use of net-centric data strategy, net-centric IA strategy, service-oriented
xxiv
architecture (SOA), and communications transport strategy. The chapter concludes with a discussion on upcoming and future trends to enable DODs move towards net-centricity. Section IV: Implementation and Deployment Section IV of the handbook looks at EA from an ongoing implementation and transition perspective through cases both in large and small organization scenarios. Chapter XVI: Enterprise Architecture as an Enabler for E-Governance: An Indian Perspective, by Raghunath Mahapatra of Ernst & Young India, India and Sinnakkrishnan Perumal from the Indian Institute of Management Calcutta, India, is a case study on application of EA to develop an efficient and effective e-governance system for citizen services administration by the Government of India. The chapter starts with a background on various e-government initiatives, including a brief discussion on the administrative structure in India. The chapter then puts forth key imperatives that are required for successful e-government programs, keeping in mind the Indian context. EA is then presented as one the critical success factors. The chapter continues with a detailed discussion of a proposed framework (derived from the Zachman Framework) that facilitates the application of EA in the context of e-government in India. The chapter concludes with a mapping of the earlier presented imperatives to the key elements of the proposed framework. Chapter XVII: Federated Enterprise Resource Planning Systems, by Nico Brehm from the Carl-von-Ossietzky-Universitt Oldenburg, Germany, Daniel Lbke from the University Hannover, Germany, and Jorge Marx Gmez from the Carl-von-Ossietzky-Universitt Oldenburg, Germany, presents enterprise resource planning (ERP) system architecture that makes individual business modules reusable through the use of Web services based on shared and non-monolithic architecture. The chapter is based on a practical challenge that enterprises currently face wherein systems (especially the ERP tools) have proprietary data models, thus limiting their usage and in conflict to their claim of being positioned as enterprise systems. This leads to vendor lock-in. The chapter begins with a background on existing ERP systems with a discussion of their limitations as real enterprise systems. The chapter then presents the federated ERP system approach and discusses how the federated approach addresses the shortcomings of existing siloed ERP systems. The chapter concludes with a discussion on the kind of adoption challenges that the federated approach might face along with a short brief on future trends and research. Chapter XVIII: A Network Based View of Enterprise Architecture, by Bala Iyer of Babson College and David Dreyfus of Boston University, USA and Per Gyllstrom, PFPC Worldwide Inc., USA, moves away from the traditional four sub-architecture-based view of EA and takes a network-based view that is based on understanding and capturing the dependencies between the elements of the EA. The proposed approach asserts that such dependencies are a factor of time and typically emerge as the architecture evolves. Dependencies that emerge during the design, deployment, and operations of the EA are based on both technical and social factors. The chapter presents a case study of the application of the proposed approach in a financial services company. The chapter concludes with a discussion of the limitations of the proposed approach and presents pointers to how the limitations can be addressed. Chapter XIX: Enterprise Architecture by a Small Unit in a Federated Organization, by Roger Sliva from the State of Nevada, USA, presents experiences and best practices in developing EA by a small team for a federated organization. A federated structure is typical in many governments where the administrative structure is organized into national/federal entities followed by states, districts, or provinces. Given the federated structure, developing EA presents several practical challenges. The chapter discusses factors to be considered in such a scenario when developing EA in terms of scope, intensity, use of tools, open standards, shared business services, and programme governance. Chapter XX: The Syngenta Architecture Story, by Peter Hungerford from Syngenta AG., Switzerland, presents the experiences of development and evolution of EA at Syngenta. The key drivers in Syngentas architecture programme are business efficiency, growth, and innovation. The chapter shares the experiences and insights from several business areas. The case studies presented in the chapter includes EA initiatives like server
xxv
rationalization and development of global infrastructure services, integrated go-to-market platform, providing an unified research platform, and building an enterprise-wide business intelligence. The chapter then presents a simple framework for EA and discusses the case studies in the context of the framework. The chapter concludes with future trends and discusses a few plausible areas of research. Chapter XXI: The Use of GERAM for Design of a Virtual Enterprise for a Ship Maintenance Consortium, by John Mo from the Commonwealth Scientific and Industrial Research Organization, Australia, describes the application of the generalized enterprise reference architecture and methodology (GERAM) in analyzing the ANZAC ship alliance (ASA). The chapter discusses the details of the use of GERA in developing and studying a virtual enterprise, especially issues relating to logistics and information architecture management needed to support the operations of ASA as a virtual enterprise. The chapter starts with a brief overview of the GERAM including the key reasons of why it was selected for use. The chapter then describes ASA as a virtual enterprise including the peculiarities and nuances of a virtual enterprise. The chapter concludes with a description of enterprise engineering programme at ASA, the artifacts and models developed based on GERAM requirements. Chapter XXII: Information Systems Architecture for Business Process Modelling, by Michel Spadoni of the Ecole Nationale dIngnieurs de Metz & Laboratory for Industrial and Mechanical Engineering, France and Anis Abdmouleh from Metz University and Laboratory for Industrial and Mechanical Engineering, France, is a description of business process modeling capabilities within the CIMOSA application server (CAS). The CAS is an information system for enterprise modeling and designing. The chapter starts with a brief overview of the problems that is faced by organizations in integrating their disparate systems. Then it describes the CAS project, its goals and objectives and the primary reason for selecting CIMOSA as the reference architecture. Following this, the chapter describes the CIMOSA modeling framework and conceptual model. The chapter then describes the business process modeling aspects with an example of a manufacturing organization including the views and artifacts needed to support the requirements of enterprise systems. Section V: Technology and Service-Oriented Architecture This section of the handbook is a compilation of chapters on the role technology plays in an architectural initiative. Chapter XXIII: Enterprise Architecture within the Service-Oriented Enterprise, by Scott J. Dowell of Shirnia & Dowell LLC, USA, elaborates the role of EA in a service-oriented enterprise (SOE). Driven by the need to the adaptable, agile, and responsive to change, organizations are now adopting the SOE paradigm where organizations view themselves as a bundle of services that are available for use through technology enablement. The chapter begins with the issues that enterprise architects need to grapple with, namely, business services, service-oriented solutions, infrastructure services, and IT organization changes. It goes on to compare a traditional enterprise with a SOE. The chapter then discusses the development of strategy in a SOE and its peculiarities. The chapter provides real-life examples on various aspects of service orientation adopted by various organizations. Chapter XXIV: A Fundamental SOA Approach to Rebuilding Enterprise Architecture for a Local Government after a Disaster, by Zachary B. Wheeler of SDDM Technology, USA, is a case study of the reestablishment of EA for the local Government following Hurricane Katrina in Louisiana. The chapter presents an approach to address areas in EA that have not received much attention as part of preparedness, response, and recovery phases. The chapter proposes the use of SOA paradigm to address some the key issues. The chapter starts with a brief background of the underlying EA framework that was used in the given situation, followed by a detailed description of the conceptual data model and how a critical portion of the EA was developed. The chapter concludes with a discussion on other technologies that can be used to extend the current solution. Chapter XXV: Business Networking with Web ServicesSupporting the Full Life Cycle of Business Collaborations, by Diogo R. Ferreira from the Technical University of Lisbon, Portugal, proposes to use the Web services paradigm as a way to deal with all aspects of business collaborations. The chapter starts with an overview of Web services as an integration platform, followed by a description of the criticality of the life cycle approach in integration. The chapter demonstrates with examples the use of Web services in extending its support of
xxvi
operational aspects alone to the full life cycle of business collaborations, thereby enabling seamless e-business collaborations and trading. Chapter XXVI: Enterprise Integration Architecture for Harmonized Messaging, by Dat Cao Ma, Belinda Carter, Shazia W. Sadiq, and Maria E. Orlowska, University of Queensland, Australia, presents a rule-based enterprise integration approach enabled through messaging technology. The chapter begins with the challenges of large-scale collaborative systems and the evolution of technology solutions to address some of the challenges. The chapter then presents the proposed enterprise integration architecture and an overview of related technologies. Following this, the chapter elaborates the steps in rule design, validation, and deployment and its adoption within the proposed integration architecture. The chapter concludes with a discussion on future developments in the proposed area. In conclusion, I hope that this handbook makes its contribution to the emerging discipline of EA, which is only going to gain importance in organizations. I would like to invite readers to share their comments about the handbook in addition to their success stories that may well spawn of future editions of this Handbook. Dr. Pallab Saha National University of Singapore December 2006
xxvii
Acknowledgments
This handbook is a result of the efforts and support of many people. Without their advice, assistance, and deep involvement, the handbook would not have achieved its current form. I would like to express my gratitude and thank all involved in the collation and review process of this reference book on enterprise architecture. I would like to start with IGI who gave me the opportunity to realize my cherished dream. This handbook allowed me to make significant contributions to an emerging and timely discipline. A special word of thanks to Kristin Roth of IGI who guided me with numerous e-mails and to Dr. Mehdi Khosrow-Pour who motivated me to initially accept his invitation for taking on this project. I would like to specially acknowledge the contribution of the independent reviewers of the chapters, who readily agreed to review despite their own busy schedules, often working on very tight deadlines given by me. Herein goes my sincere thanks to Dr. Hoe Siu Loon of Singapore Telecommunications, Rina Levy of The Mitre Corporation, and Dr. Sam Chung of the University Of Washington (Tacoma). Representing both industry and academia points of view, they provided excellent review comments that improved the overall submission quality. An important part of this handbook is the chapter authors. I appreciate their excellent contributions and want to thank them for assisting me in the review process. Last but not the least, this handbook would not have become a reality without the support of my mother Shrimati Anima Saha, my wife Neeta, and our adorable daughter Anushka (who was born last year as I conceived this book). Above all, I would like to dedicate this book to my father, the late Shri Jagatbandhu Saha. Dr. Pallab Saha Singapore December 2006
xxviii
Section I
A Synergistic Assessment of the Federal Enterprise Architecture Framework against GERAM (ISO15704:2000)
Pallab Saha Institute of Systems Science, Singapore
Chapter I
ABSTRACT
The federal enterprise architecture framework (FEAF) is perhaps the most adopted EA framework, especially within the U.S. Government agencies. Either the FEAF has been adopted as-is or other frameworks derived from the FEAF have been used. The FEAF today continues to be the most comprehensive framework available for guidance by agencies. It consists of a full-fledged methodology, several reference models, target architectures, and even a toolkit that facilitates adoption across all agencies. This chapter evaluates the synergies between the comprehensive FEAF against the generalized enterprise reference architecture and methodology (GERAM) framework. The intent of the evaluation is to present the level of completeness in the FEAF based on GERAM requirements and additionally discuss areas where the FEAF goes well beyond ISO15704:2000 requirements leading to improvement opportunities in GERAM.
INTRODUCTION
Enterprise architecture (EA) is the discipline of designing enterprises guided with principles, frameworks, methodologies, requirements, tools, reference models, and standards. Managers are becoming architects. Their new roles include designing structure, engineering processes, developing
people, leveraging technology, facilitating learning, and changing the whole (Morabito, Sack, & Bhate, 1999). The manager-architect must design across enterprise boundaries, engineer processes into strategic capabilities, align information technology and business strategies, and integrate the enterprise. In order for the manager to achieve all these, several contending architecture frameworks
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
are available (Bernus, Nemes, & Schmidt, 2003; Chen & Doumeingts, 1996; Chen, Vallespir, & Doumeingts, 1997). Of the several contending architecture frameworks, this chapter analyzes the federal enterprise architecture framework (FEAF) approach to EA against the generalized enterprise reference architecture and methodology (GERAM) / ISO15704:2000 requirements. The objective of this detailed analysis is to provide prospective users of the FEAF, an understanding of GERAM/ISO15704:2000 requirements, and the extent to which the FEAF-based approach meets these requirements. Several other frameworks have been analyzed against the GERAM/ISO15704:2000 requirements (Noran, 2003, 2005; Saha, 2004a), currently there is no mapping between the FEAF and GERAM and the chapter attempts to address this gap. The key objectives of the analysis presented in this chapter include: (1) map and compare the FEAF-based approach to a common set of EA requirements as specified in GERAM; and (2) identify areas where the FEAF is richer/weaker, with the aim that managers and researchers can take benefit in practice and in identification of newer areas for research, including enhancement of existing frameworks. The key motivations for selecting FEAF for this assessment include: he FEAF is perhaps most implemented T either as-is or in derived form. It may be argued that FEAF is relevant only in the context of United States Federal Government agencies. However, in reality, all of the FEAF documentation is available in public domain and many EA programs around the world take cue from FEAF (localized for specific needs). he FEAF is an embodiment of best practices T and guidelines. An assessment actually has the capability to further the EA discipline and its practice.
he FEAF by design is generic and apT plicable to all agencies, irrespective of the industry they operate in. This makes FEAF application non-industry specific and broad.
cal and physical data resources and management of such resources. The technology architecture describes the information technology infrastructure required to support the organizations business processes and information architecture. The application architecture describes the software applications needed to deploy organizations business processes governed by business rules (CIO Council, 1999).
ASSESSMENT APPROACH
The analysis attempts to assess the FEAF in meeting GERAM requirements. In case of the FEAF lacking in certain areas, this chapter provides guidance toward ensuring common understanding of deliverables, and ways to complete it using GERAM requirements as the reference. With this aim, the analysis centers on several aspects, each discussed in detail in subsequent sections.
state. This is crucial as it enables future progress to be measured against a reference or baseline. As baseline architectures focus on capturing the current state, organizations usually decide on the level of details and complexity desired. This phase of developing the baseline architecture takes and provides critical input to the requirements phase. Once the organization documents the current architecture and requirements for the future to-be architecture, it is ready to undertake the development of the target architecture, which primarily is the process of addressing gaps between the as-is and to-be states. The next phase in GERA is implementation of the EA and this maps to develop the sequencing plan in the FEAF. This process focuses in developing a transition/migration plan for the organization to move from the as-is state to the to-be state. In this, phase organizations usually take inputs from industry specific standards that may be available. The primary goal of this stage is that the organization starts operating with the new EA in place. The next GERA phase of operation maps directly to use the enterprise architecture process in the FEAF. The focus here is to ensure the target EA is implemented and good EA management practices enforced leading to continuous governance. Decommissioning the EA at the end of its useful life is the last phase in GERA; the FEAF specifies maintain the enterprise architecture as its last process step. The objective of this phase is to establish a process to ensure that the baseline architecture accurately reflects the current state and the target architecture correctly represents the future business vision.
porates new business processes, new technology, and new capabilities is evident in both GERA and the FEAF. While the EA process specified by the CIO Council is not specific to the FEAF, its application in the FEAF context is well accepted.
tions of the Federal EA at Level IV. The temporal aspect is tightly integrated to the FEAF EA process, providing time-based anchors during the architecture life cycle to represent various forms that the EA takes. Level I is the highest level of the FEAF that introduces the eight core components and interplay between them in developing and maintaining the architecture. Level II depicts the business and design elements and the relationships between them. At this level, the business of the enterprise along with the architectural design needed to support the business is represented. The relationship is push-pull, where the business pushes the design and the design pulls the business to higher levels of capability and service delivery. Level II further elaborates on the migration processes that facilitates the movement of the enterprise from the baseline to the target architecture adhering to the architecture standards. A critical activity in Level II is the development of the business architecture. Level III expands on the design elements that are needed to support the business architecture. This includes development of the data, technology, and applications architecture. Application of design standards like data standards, security standards, applications standards, and technology standards is a critical activity at this level. Level IV identifies the specific kinds of models that specify the business architecture along with the design architectures (data, technology, and applications). At this level, the mechanism for design architectures to support the business architecture is made explicit. Additionally EA planning takes place at this level. The models to specify the business and design architectures and the architecture planning that occur at Level IV are based on the Zachman Framework for EA (Zachman, 2000) and Spewaks EA Planning Methodology (Spewak, 1993). In its current form, the FEAF Level IV incorporates only three of the six columns from the Zachman Framework (i.e., what, how, and where). The who, when, and
1. 2. 3.
The life cycle dimension, The life history dimension, and The perspective dimension.
MODELING FRAMEWORK
The GERA modeling framework is included as a core component in the GERA reference architecture. In specifying the scope and type of enterprise models that need to be developed and maintained as part of the architecture development process, the modeling framework plays a crucial role. The analysis of the FEAF against GERAM modeling requirements incorporates two critical issues, which are: (1) the richness of guidance provided in the FEAF with regard to the scope and types of models to be created and maintained; and (2) the ability of the FEAF to accommodate the complete scope of modeling framework as in the GERA specifications.
The coverage and mapping of the first two dimensions by the FEAF has already been discussed. With regard to the perspective dimension, the FEAF explicitly mentions the existence of multiple perspectives and their mapping to the various architectures that are developed to build the overall EA. Each row (perspective) represents a holistic view of the architecture from a particular perspective. Each row represents a unique perspective; however, the model for each perspective provide necessary details to specify the solution at the level of the perspective and translates to the next lower row explicitly. The FEAF recommends five perspectives/views. The planners view specifies the overall scope of the architecture, while the owners, designers, builders, and the subcontractors views specify the enterprise, information systems, technology, and detailed specification models, respectively. Each column represents a specific area of focus and this drives the way the overall architecture is partitioned. In summary, each column poses a fundamental question (i.e., what, how, and where), while the way these fundamental questions are answered depend on the viewpoints of the stakeholders in architecture development. The intersections of the rows and columns specify the models that need to be developed. The FEAF specification provides fairly detailed descriptions of the models that are to be developed and further enriched with illustrations. With the same intention of reducing complexity and providing a structuring mechanism, GERA also supports multiple views that accommodate viewpoints of different stakeholders. While GERA is not normative about the actual views, it explicitly identifies two areas for conformance by candidate architectures, which are: (1) the overall intent of the four GERA views must be covered; and (2) the views should be subdivisions of an integrated
metamodel such that the combined scope of the modeling framework is complete. The mapping between GERA and the FEAF views is a little convoluted. GERA model content views with focus on user-oriented process representation of the enterprise entity descriptions maps to the FEAF planners and owners view but largely along the activities column. GERA purpose views with focus on mission of the enterprise entity and products and services required to support the enterprise objectives roughly map to the FEAF planners and owners view mostly along the entities column. GERA implementation views focusing on tasks that are/are not to be automated roughly maps to the FEAF designers view. Lastly, GERA physical manifestation views with focus on software and hardware required to realize the architecture maps to both the FEAF builders and subcontractors view.
(TRM), business reference model (BRM), performance reference model (PRM), service component reference model (SRM), and the data reference model (DRM). Additionally, it is believed that as and when the FEAF specifications include the remaining three columns (i.e., who, when, and why) addressing three more fundamental questions, the mapping with GERA would become tighter.
MODELING LANGUAGES
Enterprise architecture involves creation of several models governed by a modeling framework and influenced by a modeling methodology. GERAM recognizes that any enterprise architecture initiative is a large and complex undertaking and thus, would require potentially multiple modeling languages (IFIP-IFAC Task Force, 1999). GERAM specified requirements for modeling languages include: 1. The (set of) modeling language(s) must be able to represent every modeling view/ viewpoint for every enterprise architecture artifact in the development methodology and extent of specificity. Models developed for one view must be linkable with models in other views as such linkages are a logical requirement for a coherent enterprise architecture view. Modeling languages must be based on reliable ontologies (metamodels with semantic rules).
2.
3.
appropriate in developing critical EA products (CIO Council, 2001). Enterprise architects selecting the FEAF must utilize several proprietary and third-party modeling languages in order to accomplish all architectural activities and products. Lack of the single/unified set of modeling language(s) for EA, based on a single underlying metamodel, creates the risk of low consistency and interoperability between various models and products, and it is upon the architect to impose discipline in this regard. The EA tool selected by the organization further influences the selection of modeling language(s) depending on the languages supported. In summary, the FEAF is open and non-prescriptive about any specific modeling language, as long as the architects goal is accomplished.
Unified modeling language (UML) for application architecture, Entity-relationship (ER) data model using IDEF 1x for information architecture, Object-role modeling (ORM) and object constraint language (OCL) for specifying business rules, Event driven process chain (EPC) and business process modeling notation (BPMN) for specifying business process view, among others.
Table 1 provides an indicative list of notations and languages that could be used in the different stages of the EA development.
In addition, GERA has several requirements for modeling methodologies, which include: 1. The criticality of human involvement in architecture development for overall program success. The need to differentiate between useroriented and technology-oriented design,
2.
3.
4.
impacting the extent of automation required by the enterprise. The need to utilize and imbibe accepted project management techniques and practices leading to increase in the extent of management and control. The need to provide due consideration to economic and performance factors to facilitate justification of the initiative and alignment with business objectives.
the FEA framework provides valuable inputs on the content of enterprise architectures, a federal level guidance specifically addressing issues like conceptualizing, realizing, implementing, operating, and maintaining an EA is also available to interested organizations (CIO Council, 2001). This treats an EA program as a project with specific activities and deliverables in each phase, allowing enterprises to follow a disciplined and structured approach to architecture development. The EA process is not a framework specific EA methodology. The decision to choose the specific framework for implementation is left to the organization. Besides the methodology, the FEAF also recognizes and recommends the establishment of EA governance structure for overall success. The recommended governance
Architecture visioning
Business architecture
Statement of architecture work. Business principles. Target business architecture. Business architecture views. Gap analysis report.
Rich pictures / English. UML. System dynamics. BPMN/BPML. OCL. Structured English. IDEF 0 & IDEF 3. ORM. EPC. IDEF 1. UML. ERM. ORM. UML. Structured English.
Information architecture
Target information architecture. Information architecture views. Gap analysis report. Impact analysis report. Target application architecture. Application architecture views. Gap analysis report. Impact analysis report. Technology baseline description. Technology principles. Target technology architecture. Gap analysis report. Impact analysis report. Technology architecture views.
Application architecture
Technology architecture
structure is in the form of: (1) setting an executive steering committee, providing management oversight and sponsorship to the EA initiative and (2) forming an EA program management office to manage, monitor, and control development and maintenance of the EA. Investment management is closely associated with the EA processes. Within the context of FEA, organizations are required to configure investments that make the organizations move toward the target architecture and these investment decisions should comply with the sequencing plan. The CIO Council recommends the use of General accounting offices information technology investment management framework in this regard (United States General Accounting Office, 2004). At Level IV, the FEAF is based on the Zachman framework. Various tool vendors have developed proprietary methodologies for the Zachman framework.
0
1. 2. 3.
4.
Partial human role models focusing on organization and responsibilities, Partial process models with focus on business processes and services, Partial technology models providing industry specific common description of resources and their aggregations, and Partial models of IT systems describing the components needed communications and information processing to enable enterprise integration.
2.
3.
The business reference model (BRM) on the other hand describes the business operations and services of the enterprise (in this case the federal government) independent of the specific organizations that perform them, including services performed by state and local government (FEAPMO CRM, 2006). The BRM, which forms a critical component in specifying the overall services blueprint of the enterprise, is organized
into four business areas, 39 lines of business, and 153 sub-functions. Together the PRM and the BRM owned by line of business owners, map to GERAM partial process and partial human model requirements. While the mapping to partial process model requirements against BRM is direct, the intent of the partial human model requirements is covered by the PRM through identification of organizational inputs, outputs, and outcomes along with key performance indicators. These can be mapped to organization and responsibilities as required by GERAM. From a technology perspective, the FEAF specifies three reference models. The service component reference model (SRM) identifies and classifies application components that support the organizations and facilitate reuse of these components (FEAPMO CRM, 2006). The SRM is categorized into seven service domains differentiated by business-oriented capability they represent. The data reference model (DRM) describes at an aggregate level, the type of data and information along with their relationships required for supporting program and business line operations (FEAPMO DRM, 2006). The technical reference model (TRM) describes the use of technology in delivering business services and relevant standards for implementing the technology (FEAPMO CRM, 2006). The TRM is comprised of four core service areas that include: service access and delivery, service platform and infrastructure, component framework, and service interface and integration. The TRM can be mapped to GERAM partial technology model requirements as the TRM focuses on the technology infrastructure required for delivery of business services identified in the BRM. The SRM and DRM together cover the requirements of GERAM partial models of IT systems. A study of the FEAF reference models reveals that the intent of GERAM partial enterprise models is covered in totality, though as expected the approaches taken to categorize the models and their intent differ.
2. 3. 4.
5. 6.
Aris Toolset Asg-rochade Enterprise Architect Front Arena Enterprise Troux Microsoft Visio Ms Visual Studio .net Ptech Framework IBM Rational Rose Select Enterprise System Architect Tivoli Enterprise
++
FEAF goes beyond GERAM specifications. Aspects analyzed in this section include: ntity types and their recursivity: The E GERAM explicitly states that the life cycle of more than one entity may be related to each other. GERA incorporates the concept of entity types and identifies five recursive entity types, which are: (1) strategic enterprise management entity, (2) enterprise engineering entity, (3) enterprise entity, (4) product entity, and (5) methodology entity. nterprise modules: Similar to component E based software engineering, GERAM also recommends the use of pre-built components/modules and incorporate an assembly based approach to enterprise architecture. reas for improvement in GERAM: This A chapter assesses the FEAF against GERAM requirements. However, the assessment also
reveals at least three critical areas where GERAM is found to be weak and these have been discussed briefly.
3. 4. 5.
to evaluate and communicate the success and effectiveness of the EA program. GERAM makes no mention of such metrics, while this is a key component within the FEAF driven initiatives (NASCIO, 2004). The FEAF recommends that agencies identify EA effectiveness metrics to support their architecture goals and objectives. Typical architecture objectives include, but are not limited to: 1. 2. 3. 4. 5. 6. Cost reduction, Higher business value of IT, Flexible IT, Cheaper and faster solutions/acquisitions, Reduction in project failures, Integration and interoperability of information services,
Adoption of service-oriented architecture (SOA), 8. Service quality guarantee, 9. Compliance, 10. Efficient portfolio management, and 11. Risk reduction.
7.
IT governance
IT portfolio management
IT project anagement
Strategic IT planning
IT performance management
Strategic planning
other key organizational activities. GERAM does not make any explicit mention about the type and intensity of impact the EA program can have on some of the organizations other activities. The FEAF on the other hand recognizes these. Table 3 lists the organizational activities that the EA programs has linkages to and also briefly describes the nature of such linkages.
not in concepts. In this regard, two points to be noted are: The FEAF is still evolving and it is highly likely that eventually it would map to GERAM even further, as a common set of requirements also has the potential to assist in the evolution of enterprise architecture practice. The discipline and practice of enterprise architecture is also evolving, hence every architecture framework hopes to set trends rather than follow it, in order to maintain its comparative advantage.
FINAL CONCLUSION
Reducing complexities, enhancing standardization, and disseminating best practices are some of the crucial recurring themes in EA practice. Standardization helps an organization to ultimately reap the benefits of economies of scale and scope. This is one of the critical goals of the FEAF. However, the advancement of practice in EA by the FEAF is limited due to the absence of a single unified architecture development language based on a common underlying metamodel. Using GERAM as a meta-framework, the assessment revealed that FEAF largely fulfills all the key GERAM concepts. By providing a generalized set of requirements, GERAM / ISO15704:2000 is an excellent baseline to map and assess candidate architecture frameworks like the FEAF. GERAM is not to be viewed as a competitor to the FEAF or any other framework. Rather, it represents a minimum set of requirements that constitute enterprise architecture practice. Such a baseline allows enterprises and architects to assess various candidate reference architectures and choose the most appropriate one based on their specific business needs. This makes the rationale for choosing a specific framework correct and reasoned and not impulsive and swayed by hype. It is clearly evident from the analysis in this chapter that the FEAF largely meets GERAM requirements and also exceeds them in a few areas. The few areas where the FEAF is found to be deficient are limited to guidance and specifications only and
GERAM at this instance is found weak in areas of (1) architecture governance and management, (2) architecture effectiveness metrics, and (3) linkages that a typical EA program might have on the organizations other related activities. From a practical perspective, these are critical to sustain the EA practice within an organization. Similarly, it is near impossible to get key stakeholder buyin in the absence of metrics that can be used by organizations to demonstrate and communicate the effectiveness of the EA program. Nonetheless, an assessment of this nature is beneficial to ensure the continued relevancy of GERAM as a meta-framework for EA.
REFERENCES
Arbab, F., Bonsangue, M., Scholten, J. G., Iacob, M. E., Jonkers, H., Lankhorst, M., Proper, E., & Stam, A. (2002). State of the art in architecture framework and tools. Telematica Institut Version 1.2. Bernus, P. (2001). Some thoughts on enterprise modeling. International Journal of Production Planning and Control, 12(2), 110-118.
Bernus, P., Nemes, L., & Schmidt, G. (2003). Handbook on enterprise architecture. BerlinHeidelberg: Springer-Verlag. Bernus, P., Nemes, L., & Williams, T. J. (1996). Architectures for enterprise integration. London: Chapman & Hall. Chen, D., & Doumeingts, G. (1996). The GRAIGIM reference model, architecture, and methodology. In P. Bernus, L. Nemes, & T. J. Williams (Eds.), Architectures for enterprise integration. London: Chapman & Hall. Chen, D., Vallespir, B., & Doumeingts, G. (1997). GRAI integrated methodology and its mapping onto generic enterprise reference architecture and methodology. Computers in Industry, 33(3), 387-394. CIO Council. (1999). Federal enterprise architecture framework, Version 1.1. Retrieved from http://www.whitehouse.gov/omb/egov/a-1-fea. html CIO Council. (2001). A practical guide to federal enterprise architecture, Version 1.1. Retrieved from http://www.gao.gov/bestpractices/bpeaguide.pdf FEAPMO DRM. (2005). The data reference model, Version 2.0. Retrieved from http://www. whitehouse.gov/omb/egov/a-1-fea.html FEAPMO CRM. (2006). FEA consolidated reference model, Version 2.0. Retrieved from http:// www.whitehouse.gov/omb/egov/a-1-fea.html IFIP-IFAC Task Force. (1999). GERAM: Generalized enterprise reference architecture and methodology. IFIP-IFAC Task Force on Architectures for Enterprise Integration, Version 1.6.3, (March). Morabito, J., Sack, I., & Bhate, A. (1999). Organization modeling: innovative architectures for the 21st century. Upper Saddle River, NJ: Prentice Hall PTR.
NASCIO. (2004). Enterprise architecture development toolkit Version 3.0. Retrieved from http://www.nascio.org Noran, O. (2003). An analysis of the Zachman framework for enterprise architecture from the GERAM perspective. Annual Reviews in Control, 27, 163-183. Noran, O. (2005). A systematic evaluation of the C4ISR AF Using ISO 15704 Annex A (GERAM). Computers in Industry, 56(2005), 407-427. Saha, P. (2004a). Analyzing the open group architecture framework (TOGAF) from the GERAM perspective. The open group architecture forum, TOGAF White Papers, (October). Retrieved from http://www.opengroup.org/architecture/wp/ Saha, P. (2004b). A real options perspective to enterprise architecture as an investment activity. The Open Group Architecture Forum, TOGAF White Papers, (November). Retrieved from http:// www.opengroup.org/architecture/wp/ Spewak, S. H. (2002). Enterprise architecture planning (2nd ed.). NY: John Wiley & Sons. United States General Accounting Office. (2003). A framework for assessing & improving enterprise architecture management, Version 1.1. Retrieved from http://www.gao.gov/new.items/d03584g. pdf United States General Accounting Office. (2004). Information technology investment management: A framework for assessing process maturity, Version 1.1. Retrieved from http://www.gao.gov/new. items/d04394g.pdf Vernadat, F. B. (1998). The CIMOSA languages. In P. Bernus, K. Mertins, & G. Schmidt (Eds.), Handbook of information systems (pp. 243-263). Berli-Heidelberg: Springer-Verlag. Zachman, J. A. (2000). Enterprise architecture: A framework. Retrieved from http://www.zifa. com
18
Chapter II
ABSTRACT
As consultant-educators, the authors created the extreme architecture framework (XAF) in order to quickly grasp an understanding of an organisations architecture from different perspectives. The framework is presented as a matrix of system types and architectural perspectives that is described by a single uncluttered diagram. Elements within the framework are defined along with the content that can include architectural representations, planning, and governance information. A discussion follows to show the relationship of the framework to planning, development, and governance activities. The minimalist framework presents a consolidated view of both human activity and software systems and can also help to foster a shared understanding between IT groups and business areas. It has been designed to answer a managers questions: Which elements of the enterprise do I need to be aware of and understand; and Which elements am I responsible for and need to manage?
INTRODUCTION
The enterprise architecture framework described here evolved slowly over a period of time. It has been heavily influenced by the assignments un-
dertaken by the authors who consult to a variety of clients across a range of industry sectors. In presenting yet another framework, it is not the authors intention to reinvent the wheel but rather to synthesise some of the best ideas in
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
the field of enterprise architecture and inject a healthy dose of experience in order to create an enterprise architecture framework that has strong conceptual foundations but can also be applied to practical situations. Early in the evolution of the framework, both authors were introduced to the ideas advocated by the extreme programming (XP) community (Beck, 2000). XP is a lightweight but highly rigorous approach to software development that the authors originally sought to emulate in their architecture framework. The extreme in XP refers to the way in which well-established best practices have been taken to the extreme. In the area of enterprise architecture, there is less consensus on what represents best practice. This also means that there is less opportunity to develop extreme practices. In fact, as the extreme architecture framework (XAF) evolved, it became obvious that the extreme in XAF was in fact a pun. The XAF is best described as a lightweight pragmatic approach to enterprise architecture that avoids the extremes of perfection and chaos. In contrast to other architecture frameworks the XAF: Is easy to describe. Encourages an agile approach to architectural work products. Unifies a number of disparate disciplines. Offers a simple, consistent view to the various parties involved in the management of enterprise resources.
The remainder of this chapter describes how the XAF attempts to present a unified view of human activity and software systems from the three perspectives of business processes, information systems, and technology infrastructure. The unified view attempts to strike a balance between architectural perfection and the inevitable chaos when there is an absence of architecture. The XAF embodies three guiding principles: 1. 2. The contribution of frameworks themselves. The need for interoperability between systems whether they be human or software systems. The various different architectural perspectives that are required to be managed (IEEE Computer Society, 2000).
3.
The chapter concludes with a description of how elements of the enterprise can be organised into groupings that reflect the disciplines responsible for building and managing the enterprise. The XAF is a perfect mechanism for highlighting these grouping and revealing the nature of the relationship between them.
Above all, the XAF can be used to answer the two questions most often asked by the authors clients (frequently IT managers and chief information officers): Which elements of the enterprise do I need to be aware of and understand; and Which elements am I responsible for and need to manage?
19
Surprisingly, the view that architecture can be both a science and an art is shared by some software architects. Roger Pressman describes architecture as representations of a software system that allow software engineers, to (1) analyse the effectiveness of the design in meeting its stated requirements, (2) consider architectural alternatives at a stage when making design changes is still relatively easy, and (3) reduce risks associated with the construction of the software. (Pressman, 2005, p. 288) At the same time, he unashamedly notes that architecture is an art (Pressman, 2005, p. 287). Based on the opinions of these two architects working in different fields, it seems that architecture is intended to provide both functional design and aesthetic appeal. Before presenting the XAF in detail, it is useful to further explore a metaphor that equates buildings with software systems and the urban landscape with enterprises. In his well-known essay on software architecture, Brooks (1995, p. 42) cites the building of the cathedral at Reims as a triumph of architectural vision. According to Brooks, eight generations of highly skilled builders sacrificed their own
ideas in order to maintain the design integrity of the cathedral. In describing the cathedral, Brooks states: the joy that stirs the beholder comes as much from the integrity of the design as from any particular excellences. Brooks offers the triumph of Reims as a sort of Holy Grail for software developers. In stark contrast, the authors of the Big Ball of Mud Pattern describe what they claim is the most frequently adopted software systems architecture. They use the metaphor of a shantytown structure to describe the software architecture and point out that the buildings are: built from common, inexpensive materials and simple toolsusing relatively unskilled labor. (Foote & Yoder, 1999, p. 7)
20
Foote et al. argue that there are a number of reasons why the big ball of mud is common: Pressure on project schedules and costs. Inexperience, lack of skills and high staff turnover. The complexity and rate of change of the software requirements.
Care must be taken not to mix metaphors. The Reims metaphor is based on the architecture of a single building while the shantytown metaphor is simultaneously based on the architecture of
buildings and a chronic lack of urban planning. Urban planning involves laying out the streets and amenities for a suburb and planning the provision of services such as water, electricity, and telephone. Individual residents of the suburb are free to build whatever style of house they desire providing it conforms to the building standards and guidelines laid down for the suburb. An example of urban planning that equates to the construction of Reims is the planning of Canberra, Australias national capital, by Walter Burley-Griffin. It is true that modern-day Canberra does not have the casino, trams, or sole
21
residential centre envisaged by Griffin. However, the overall layout of Canberra and its capital is instantly recognisable in the original 1912 plan. In contrast to Canberra, a shantytown represents an extreme lack of urban design resulting in opportunistic utilisation of space that has adverse affects on land use and the shantytowns residents. These metaphors provided the starting point for the XAF. Reims and Canberra reflect the extremes of architecture as art. Reims was built as a symbol of glorification and Canberra as a symbol of national pride. At the opposite extreme, a shantytown suffers from a complete absence of urban planning and is built from whatever comes to hand. The result is misery for the towns inhabitants and degradation of the environment. Confronted by these two extremes, the authors found themselves drawn to what the Buddhist faith calls the middle path.
avoiding the extremes gives vision and knowledge and leads to calm, realization, enlightenment. (Thera, 1958) It is a fact that most architects and urban planners spend the majority of their time following the middle path. Few are involved in the planning of entire cities or the design of cathedrals. Instead, the majority of architects and planners spend their time designing suburban houses and planning the layout of residential suburbs. This simple reality offers the perfect metaphor of a suburban house in a residential suburb sitting between the two extremes of perfection (Reims, Canberra) and chaos (shantytown). The precise choice of architectural elements used to describe an enterprise provides the structure of an enterprise architecture. The selected elements must interact with each other in a con-
22
sistent manner in order to provide a holistic view of the enterprise. An enterprise architecture framework provides support by serving as a checklist to identify the actual enterprise elements1 that describe an enterprise. The structural integrity of an enterprise architecture is maintained by carefully defining the relationships between architectural elements and ensuring that framework will highlight the impact of change.
support while the cladding provides shelter and aesthetic appeal. Maintaining the exterior of such a building is a simple matter of replacing worn or damaged sections of the external cladding. When required, the appearance of a building can be completely renovated by simply replacing the cladding. Maintaining or renovating the exterior of a building with a frame has no impact on the structural integrity of the building. To summarise, the role of a buildings frame is to provide structure and support while maintaining structural integrity in the face of change. Enterprise architecture frameworks provide structure, support, and integrity in much the same manner as the frame of a building: There are a plethora of enterprise architecture frameworks. For those interested, Shekkerman (2004) offers a useful inventory of the more important frameworks. The three frameworks that have had the greatest influence on the XAF are listed next:
23
The Zachman framework (Zachman, 1987) is perhaps the best-known enterprise architecture framework. The presentation of the XAF as a matrix reflects the influence of this framework. The NIST framework (Fong & Goldfine 1989) is one of the earliest enterprise architecture frameworks and has had a strong influenced on many subsequent frameworks. The architectural views adopted by the XAF as matrix columns, reflect the influence of this framework. The TOGAF framework (The Open Group, 2003) is a comprehensive enterprise architecture methodology that places great emphasis on interoperability between systems. The influence of this framework on the XAF is reflected in the choice of systems as matrix rows.
factors that are far more abstract and often quite difficult to measure. Figure 7 shows the classification of human activity and software systems on which the XAF is based. There are three categories of human activity system: 1. An industry sector is a system of interacting enterprises that are all engaged in a similar type of activity. Travel, banking, and education are all examples of industry sectors. An enterprise is a collection of individuals performing systematic and purposeful activities in support of a well-defined mission. Travel agents, airlines, banks, and educational institutions are all examples of enterprises. A business process has been defined as a sequence of activities that produce outputs of value to the customers of the process (Hammer & Champy, 2003). Hotel or airline reservations, funds transfer, and student enrolments are all examples of business processes.
2.
3.
There are two categories of software system: 1. A software application is a mechanism for packaging and physically deploying a collection of software functions that are designed to support one or more business processes.
Software Systems
24
2.
A software component is a piece of software that can be easily replaced by another piece of software and can potentially be reused in a number of different applications. A reservations Web service provided by an airline, a calendar visual component, a banking database, and a reusable computerbased training module are all examples of components.
another enterprise or that a software application may only support a single business process. While the hierarchical and nested representations of enterprise systems may have been convenient in the past, there are a number of factors in the modern business environment that now make this perspective somewhat less valid: It is common for business processes to be outsourced. This means that more than one enterprise can have responsibility for a business process and invalidates the notion of a business process being nested inside a single containing system. It is now normal practice for people outside an enterprise, such as customers, agents, and suppliers, to interact directly with the enterprises software applications. This invalidates the notion that software applications are nested inside business processes that are in turn nested inside an enterprise. Modern software development techniques emphasise the creation of reusable software components. This invalidates the notion that a software component is nested inside a
The enterprise systems shown in Figure 7 are organised into a hierarchy. This is a common representation of enterprise systems that emphasises their composition. The hierarchy of systems suggests that industry sectors are composed from a number of enterprises, enterprises are composed from a number of business processes, and software applications are composed from a number of software components. Another common representation of enterprise systems is to show them nested one inside the other. This perspective suggests that an individual system can only interact with the system that contains it or the other systems sharing the same container. This implies that a business processes may not interact with the business processes of
25
single software application since the goal is to reuse a component many times in order to construct a variety of software applications. In addition, the recent trend toward internet Web services means that an entire industry sector can use the services provided by a single software component thus invalidating the entire hierarchy of systems. For these reasons, the authors believe that it is more realistic to view the human activity and software systems of an enterprise as a number of independent and overlapping systems. This representation is shown in Figure 8. Independent, overlapping systems are able to interact with each other in an unrestricted manner. For example: A single software applications may support a number of disparate business processes. A single business processes may extend across a number of different enterprises. A single software application may support the business process of a number of different, unrelated enterprises.
A software component may be designed to provide a suite of generic services that are used by one or more industry sectors.
Regarding human activity and software systems as independent and overlapping leads to an overriding requirement for interoperability between the individual systems. Interoperability can be defined as the ability of a system to successfully interact with other specified systems.
ARCHITECTURAL VIEWS
High levels of interoperability are unlikely to be found in enterprises that resemble a shantytown. Interoperability requires a high level of structural integrity in the interfaces between enterprise systems. As the builders of Reims and Canberra knew only too well, it is necessary to develop a detailed architectural plan and stick to it in order to achieve a high level of structural integrity. Describing a large building, town, or city is a complex task and for this reason architects and urban planners present their plans using a number of complimentary views. An urban planner might create one view to show the proposed subdivision of land. Another view might show the routing of services such as electricity, gas, water, and sewage. Additional views might include transportation, public amenities, or environmental concerns. For similar reasons, enterprise architectures are also normally presented as a number of complimentary views. Perhaps the best-known set of architectural views are those described in the Zachman framework (Zachman, 1987). The Zachman framework describes an enterprise using two orthogonal dimensions based on five enterprise roles (planner, owner, designer, builder, sub-contractor) and six English language imperatives (what, how, where, who, when, why). A different set of architectural views are described in the National Institute for Standards
26
Technology
Information
Software
Activity
Data
and Technology (NIST) architecture framework (Fong et al., 1989). Following the enactment of the Clinger-Cohen Act in the United States, the NIST architectural views were endorsed by the Office of Management and Budget (OMB), which issued a directive requiring government agencies to develop enterprise architectures. The directive included an architecture framework based on the NIST framework. Since the enactment of the Clinger-Cohen Act, the U.S. government has unveiled a number of electronic government initiatives. To support these initiatives, the OMB has developed and published its federal enterprise architecture (FEA). In contrast to the original OMB reference architecture, FEA is more complex and closely aligned with the specific needs of the U.S. government. One of the attractions of the original OMB reference architecture is its simplicity. It has just three major components: 1. 2. 3. Enterprise architecture. Technical reference model. Standards profile.
technical environment in which software executes. The technical reference model is a comprehensive list of the generic services provided by the enterprises technology infrastructure. The list includes items such as: Data interchange services Data management services Graphics services Directory management services Network services Operating system services
The enterprise architecture consists of five architectural views that together describe the enterprise: 1. Activity architecture 2: Describes an enterprises high-level business activities and workflows. Information architecture3: Describes the information required to support the business activities described in the activity architecture. Software architecture4: Describes the software that is required to support the Activity and Information Architectures. Data architecture5: Describes the logical and physical structure of the enterprises software-maintained data stores. Technology architecture6: Describes the
2.
3.
4.
5.
The technical reference model groups the services into logical classifications rather than identifying specific products or solutions The TOGAF framework (The Open Group, 2003) includes a detailed example of a technical reference model. The standards profile is a collection of standards that fully specify the generic services identified in the technical reference model. Standards are fundamental to the achievement of interoperability between systems. Internally developed guidelines, de facto standards, and formal international standards may all be included in the standards profile. It should be briefly noted that the reference architecture described in the OMB directive does not exhaustively define an enterprise. A full understanding of an enterprise must include elements such as business strategy, culture, and values. These elements will influence the architecture in much the same way that financial, political, and social factors influence urban planning. The architectural views from the OMB enterprise architecture have been chosen as the basis for architectural views in the XAF because of their ease of understanding when compared to the architectural views presented in the Zachman framework. In the authors experience, most people readily understand the Zachman framework
27
views that are based on the six English language imperatives. However, many people struggle with the Zachman framework views that are based on the five enterprise roles.
matrix format was chosen because the Zachman framework has demonstrated the power of mapping orthogonal dimensions coupled with the simplicity and universal appeal of presenting an architecture framework as a matrix. The rows of the XAF matrix are labelled with the five independent, overlapping systems previously described. The columns of the matrix are labelled with the five architectural views from the OMB reference architecture. The individual cells of the matrix are used to organise architectural content. The labels of the
Information
Software
Data
Technology
Enterprise
Workflow
Process
Networks Interface Requirements Functional Requirements Non-Functional Requirements Storage Requirements Platforms
Application
Use Cases
Architecture
Component
Schemas
28
intersecting row and column classify the content of each cell. For example: The cell at the intersection of the sector row and the activity column contains content that describes the activities performed within an industry sector. The cell at the intersection of the process row and data column contains content that describes the data associated with a business process. The cell at the intersection of the application row and software column contains content that describes the requirements for an individual software application.
ARCHITECTURAL ELEMENTS
Each cell in the matrix contains a number of architectural elements that further refine the coarse classification scheme provided by the rows and columns of the matrix. Figure 4 shows the complete XAF with the 18 architectural elements added to the framework. Notice how some of the cells have been grouped together when they share similar content across a number of rows of columns. The most obvious examples are the grouping of sector, enterprise, and process into a single row representing human activity systems and the grouping of the entire technology column into a single cell. A necessarily brief description of the 18 architectural elements is given next. The descriptions are deliberately presented at a fairly high level of detail in order to facilitate the mapping of the XAF to other standards such as the unified modelling language (UML) or the integrated definition methods (IDEF) series of standards. Activities: Describe the business activities performed within a sector, enterprise, or business process.
Workflows: Describe the flow of physical objects and information between business activities. Subject areas: Classify and group information requirements having a common theme, subject areas can also be used to group businesses objects and storage requirements. A database7 is a special case of subject area that is actually implemented and physically deployed. Information requirements: Identify and describe the information required in order to successfully perform an activity as well as any information that is produced as an outcome of the activity. Functional areas: Used to classify and group functional requirements that have a common purpose. Functional areas can also used to group non-functional requirements, interface requirements, and use cases. Business objects8: Represent the concepts of interest within the sector, enterprise, or process. A useful scheme for classifying concepts of interest can be found in Peter Coads work which identifies the following categories (Coad et al., 1999, pp. 3-6): Business-related events and time periods. The roles of people, organisations, places, and things. The actual people, organisations, places, and things. Classifications of any of the above. Use cases: Describe the usage of a software application by identifying interactions between an actor (user) and the software (Jacobson, 1992). Each step in the interaction either provides some direct value to the actor or indirect value to the applications stakeholders. Use case steps provide value by: Enforcing business rules. Controlling a hardware device. Storing data. Presenting information to the actor.
29
Interface requirements: Provides a detailed description of either a user or software interface. Interface requirements may include detailed definitions for each of the data elements included in the interface. Functional requirements: Describe the mandatory capabilities, actions, and behaviour of a proposed software application. Non-functional requirements: Describes the requirements of a proposed software application that are not related to its capabilities, actions, or behaviour. Non-functional requirements include: Quality attributes of an application such as performance, usability, security, reliability, recovery, audit, and archiving. Application constraints relating to the software platform, the stakeholders, the external environment, the applications life cycle, and its design. Storage requirements: Describe data that will be permanently stored (persistent data). Storage requirements may include detailed definitions for each of the data elements included in the requirements. User interfaces: The physical screens reports and Web pages that a user interacts with. Architecture: Various high-level views of a software application. A useful scheme for classifying architectural views can be found in Hofmeister et al. (1999), which identifies the following views: Underlying conceptual organization of the software. The individual modules from which the software constructed. The organisation of the source code. The run-time deployment of the software. Code: The human readable source code that defines the software and the binary code that is executed.
Schemas: Defines an electronic data store in terms of the records (or tables) and the relationships between the records. Networks: The mechanisms that are used to interconnect hardware and software platforms to permit the transfer of data and invocation of remote of services. Platforms: The hardware, firmware, system software, and middleware required to deploy and execute a software application. Frameworks: Standard component models and/or reference software architectures such as J2EE or .Net.
ENTERPRISE ELEMENTS
The XAF architectural elements offer a checklist that can be used to identify the elements that actually describe a specific enterprise. The XAF uses the term enterprise elements to differentiate these elements from the architectural elements previously described. The following enterprise elements might be used to describe part of an enterprise architecture for a hotel: Activities: Accept reservations Check in guest Provide room service Provide laundry Check out guest Information Requirements: Guest details Room types Room availability Room maintenance schedule Room utilisation rate Functional Requirements: The system shall allow reservations to be created from guest history. The system shall allow reservations to be created for individuals or groups.
30
The system shall allow reservations for more than one room to be created. The system shall record the guests arrival date, time, and flight number.
ARCHITECTURE CONTENT
The XAF architectural elements also provide a classification scheme for architecture content. Each cell (or group of cells) in the framework matrix can contain different types of content. The content can be further classified into content that describes architectural elements or enterprise elements.
of the architecture itself can also be defined. For example, the principles of minimising data redundancy and duplication or the principle of performing data entry at the first point of data capture. Again this principle would apply equally to all information and storage requirements. A strategy or course of action to achieve a desirable, future state of an architectural element: For example, a strategy to facilitate transfer of data between business activities by integrating software applications using a hub and spoke architecture.
Content for architectural elements is normally associated with planning. It would also be possible to extend this area of the framework to incorporate balanced scorecard techniques (Kaplan & Norton 1990, 2004) as well as the planning models described by the Business Rules Group (Hall, Healy, & Ross, 2005, p. 1-2). The authors have experimented with synthesising the ideas from these thinkers into the framework.
31
sessments might also refer to potential risks and rewards associated with the current state of the enterprise element. A potential risk associated with an enterprise element: For example, low customer satisfaction associated with the check in process at a hotel. A potential reward associated with an enterprise element: For example, a reduction in staff costs associated with an internet-based guest reservation system.
context for the individual software applications of the enterprise. The requirements definition row defines the requirements for a single software application. The row includes the applications use cases, interface requirements, functional and non-functional requirements, data storage requirements, and an elaboration of technology requirements documents. It should be obvious that the content of this row also reflects the typical content of a requirement definition document. The software construction row describes the physical artefacts that together implement a single software application. Here are found the artefacts of software development such as user interfaces, software architecture, program code, and database schemas. Notice how a part of the technology column is included in all three of the rows. This would appear to reflect that the appropriate use of technology needs to be considered at all three levels.
COLUMNS
Partitioning the framework into columns also provides a major insight into the framework. The logical choice of names for the columns tends to reflect the management disciplines frequently tasked with the governance of the enterprise architecture. The process improvement column includes the elements that are the focus of business process reengineering projects or continuous improvement initiatives. Activities define the scope of the improvement while workflows define the improved processes. Use cases and user interfaces describe how a software application will support the improved process. The information management column includes the elements that need to be properly managed in order for an organisation to make effective use of information. It includes the grouping of information requirements into subject
ROWS
Partitioning the cells of the framework into rows and attempting to name them offers a major insight into the framework. The most obvious choice of names for the rows tends to reflect the major disciplines associated with the systems development life cycle. The business modeling row describes what the enterprise does and how its activities are supported by its software systems. The row includes the activities performed, workflows between activities, information requirements, business objects, a high-level grouping of software functions into a number of functional areas, and the technology platforms and networks used to support business activity. This row provides the
32
Information
Software
Data
Technology
Subject Areas
Subject Areas
Enterprise Process
Workflow
Workflow
Requirements Definition
Application
Use Cases
Use Cases
Networks Networks
Non-
Platforms Platforms
Frameworks
Frameworks
Requirements
Architecture Architecture
Component
Schemas Schemas
Software Construction
Activity Sector
Activities
Information
Software
Data
Technology
Enterprise
Workflow
Process
Networks Functional Requirements Non-Functional Requirements Platforms Storage Requirements Frameworks
Application
Use Cases
Interface Requirements
Architecture
Component
Schemas
Information Management
Data Administration
areas that are independent of business processes and the management of all electronic and paperbased records. The software portfolio management column includes the elements that define an organisations software portfolio. The portfolio is likely to a mixture of bought-in packaged software and custom in-house developed software. A major concern of those who focus on this column is the integration of disparate software.
The data administration column includes the elements that define an organisations electronic databases. While data administration is often regarded as an on-going function, it should not be forgotten that this is also the discipline that drives data quality improvement and data integration projects. The infrastructure management column is often viewed as the operations domain. The elements in this column represent the organisations
33
hardware and software platforms together with the networks that interconnect them. The operations group also manages the technical frameworks underlying the technology. While the discipline is mainly concerned with guaranteeing the smooth running of technology, infrastructure projects such as the technology conversion, standard operating environments, or rationalisation of networks and technology also fall into this domain.
construct the software portfolio by identifying the functional requirements, designing databases, and writing program code. However, it can be argued that business groups must be actively involved in the management of the software portfolio if it is to meet their needs and be properly aligned to the goals of the enterprise. The authors conclusion is that both groups must share responsibility for the software portfolio. This column represents the boundary between the two groups; it is where most benefit will be gained from collaboration and joint responsibility. For many enterprises, this column will come to represent what the authors call an axis of joy or an axis of sorrow.
Information
Software
Data
Technology
Enterprise
Workflow
Process
Networks Interface Requirements Functional Requirements Non-Functional Requirements Storage Requirements Platforms
Application
Use Cases
ARBITRARY AREAS
Schemas
Architecture
Component
Business ownership
IT ownership
As well as the rows and columns previously described, the cells of the XAF can be grouped into any number of arbitrary areas. This approach
34
To summarise the various groupings of the XAF previously discussed: The horizontal rows describe the disciplines associated with projects and are applied to various phases of the system development life cycle. The vertical columns represent the management disciplines that are required for proper governance of the enterprise architecture. Groupings of vertical columns represent the responsibilities of business and IT groups with the software column representing an area of joint responsibility. Individual cells represent areas of potential conflict (or cooperation) between the needs of projects and good governance. Arbitrary areas represent the scope of unique types of work; typically project assignments.
Information
Software
Data
Technology
Enterprise
Workflow
Process
Networks Interface Requirements Functional Requirements Non-Functional Requirements Storage Requirements Platforms
Use Cases
Application
Architecture
Component
Schemas
Software Construction
can be very useful for scoping areas of special interest. As an example, the authors will briefly discuss how they have used the framework to scope consultancy projects. In one project, the framework was used to plan the development of a requirements traceability matrix. The client wanted to be certain that the software application they had acquired satisfied their documented requirements and would successfully integrate with other applications. The basic question they wanted to answer was, Have we covered everything? To determine the scope of the assignment, the authors presented the framework using a colourful laminated card. As well as helping to explain the nature of the XAF, the reference card served as a focal point for negotiating the scope of the assignment. A number of possible boundaries for the assignment were physically sketched on the reference card. Presentation of the XAF in this manner assisted the client to articulate what they wanted at the authors to cover. The final sketch became the scope of the assignment and the basis of the project charter.
35
Information
Software
Data
Technology
Enterprise
Workflow
Process
Networks Functional Requirements Non-Functional Requirements Platforms Storage Requirements Frameworks
Application
Use Cases
Interface Requirements
Architecture
Component
Schemas
Coordinating activities performed by the life cycle disciplines and management disciplines. Arbitrating in conflicts between the life cycle and management disciplines.
greater relevance to the modern enterprise than the abundance, privilege, and order of Reims cathedral or the disenfranchisement, poverty, and chaos found in a shantytown. Secondly, the XAF is extreme because it exaggerates the best aspects of other architecture frameworks. Like the Zachman framework, the XAF is easy to describe: It is based on a simple five by five matrix. The body of the matrix is populated with just 18 architectural elements. The authors present the framework using a single, colourful reference card that everyone seems to want. The use of a matrix provides a simple structuring mechanism for the architecture. The relationship and interaction between elements in adjacent cells is easy to understand and the impact of change is easy to see. The complete matrix offers a holistic view of the enterprise as a whole. In contrast, many architecture frameworks are complex and difficult to describe. The documentation for TOGAF Version 8 runs to 313 pages and includes many complex diagrams.
WHY EXTREME?
How can an architecture framework that evolved out of a search for the middle path be called extreme? Firstly, enterprise architecture is beset by extremes. At one extreme, the would-be builders of corporate cathedrals will settle for nothing less than perfection. At the other extreme, the builders of chaotic shantytowns grab the first solution that comes to hand. As we have seen earlier, when the image of a modest suburban house is placed between the images of a cathedral and a shantytown it becomes obvious that the middle path is in fact an attractive alternative to the two extremes. However, it is important to emphasise that following the middle path is not the same as sitting on the fence. The suburban house as a metaphor for self-reliance, affordability, and pragmatism has a much
36
The XAF encourages an agile approach to architecture work products: The 18 architectural elements serve as a comprehensive but manageable checklist for many different types of architectural content. This versatility supports the development of many different styles of enterprise content. In contrast, many architecture frameworks advocate the creation of a large number of elaborate and detailed models. For example, the Zachman framework identifies no less that 36 primitive models. The XAF unifies a number of disparate disciplines: We know of architecture groups that work in splendid isolation. Their elaborate models never make one iota of difference to the business managers, business analysts, software developers, or IT infrastructure groups. In our framework, the 19 architectural elements can be grouped into four different areas. Each area is focused on a particular group but retains the context of its relationship to the other elements. The XAF offers a simple, consistent view to the various parties involved in the management of enterprise resources: This encourages shared understanding between disparate groups by presenting an area of common ground that can be understood by everyone. This leads to increased participation and ownership by all parties. In contrast, some frameworks organise models according to various roles and disciplines. This tends to encourage redundant descriptions of architectural elements at different levels of detail. For example, the Zachman framework answers the questions what, why, when, how, where, and who from the perspective of five different roles. The framework can provide a means to explicitly acknowledge the responsibility that some groups have for certain architectural elements: From the opposite perspective, it also serves as an encourage-
ment for people to acknowledge the responsibility that others have for architectural elements. Above all, the XAF is a middle of the road vehicle for those businesses and IT groups who cannot afford the comprehensive nature of some published frameworks and who wish to avoid the chaos of not having one at all.
REFERENCES
Beck, K. (2000). Extreme programming explained: Embrace change. Upper Saddle River, NJ: Addison Wesley. Brooks, F. P., Jr. (1995). The mythical man-month: essays on software engineering. Reading, MA: Addison-Wesley. Checkland, P., & Scholes, J. (1990). Soft systems methodology in action. Chichester, UK: John Wiley. Coad, P., et al. (1999). Java modelling in color with UML: Enterprise components and processes. Upper Saddle River, NJ: Prentice Hall. Fong, E. N., & Goldfine, A. H. (1989). Information management directions: The integration challenge. National Institute for Standards and Technology (NIST). Foote, B., & Yoder, J. (1999). Big ball of mud: Pattern languages of program design 4. Addison-Wesley. Hall, J., Healy, K., & Ross, R. G. (2005). The business motivation modelBusiness governance in a volatile world. Business Rules Group. Hammer, M., & Champy, J. (2003). Reengineering the corporation: A manifesto for business change. HarperCollins. Hofmeister, C., et al. (1999). Applied software architecture. Addison Wesley.
37
IEEE Computer Society. (2000). Recommended practice for architectural description of softwareintensive systems, Std 1471-2000 IEEE. Pressman, R. (2005). Software engineering: A practitioners approach (6th ed.). New York: McGraw-Hill. The Open Group. (2003). The Open Group architecture framework (TOGAF), Version 8, Enterprise Edition, San Francisco, California: The Open Group. Retrieved July 18, 2003, from http://www.opengroup.org/architecture/togaf8doc/arch/ Thera, V. P. (1958). The Buddha: His life and teachings. Kandy, Sri Lanka: Buddhist Publication Society. Retrieved January 2006 http://www.buddhanet.net/e-learning/buddhism/bud_lt11.htm Zachman, J. A. (1987). A framework for information systems architecture. IBM Systems J., 26(3).
6 4
ENdNotES
1
Enterprise elements can be regarded as instances of architectural elements. For example, a framework might include business objects as one of its architectural elements. The corresponding enterprise elements would include the actual business objects such customer, supplier, product, and purchase that are relevant to a specific enterprise. In the OMB memorandum, this architecture is called the business process architecture. We have changed the name because we have already used the phrase business process to describe a type of system. It is common practice to either combine the information architecture with the activity architecture and call it a business architecture or to include information requirements in the data architecture. We do not like the first approach, as the phrase business architecture sounds rather vague and nebulous. As far as the second approach is concerned, we feel it
does not highlight the fact that information is related to business activity while data is more closely related to information technology. In addition, there are issues associated with an information architecture such as the management of non-electronic records that are not accommodated well in the data architecture. In the OBM memorandum, this architecture is called an applications architecture. We have changed the name because we have already used the word application to describe a type of system. The change of name also allows for a more service-oriented view of software. The software architecture and data architecture together could be viewed as the definition of an information systems architecture. In fact, this composite architecture would appear to be a much better candidate to be named applications architecture. The technology architecture includes components such as hardware platforms, operating systems, database management systems, networking software, and the communications infrastructure. Terms used in the database world can be mapped to those used in the framework. A logical data model is equivalent to the business objects. A physical data model (or database design) is equivalent to storage requirements. Data manipulation language (DML) is code. Data definition language (DDL) defines a database schema. A DBMS such as Oracle is technology. Strictly speaking, the objects of object-orientation have relevance in three places in the framework; The persistent business objects described here belong in the data column; business objects that have behaviour (as well as state) belong in the activity column (we actually dont recommend that activities are modelled in this way but some users of the framework may prefer this approach); and software classes and components belong in the component row.
38
39
Chapter III
AbstrAct
Often, in an enterprise engineering (EE) project, it is quite difficult to figure out what exactly needs to be done due to the rather generic (and often proprietary) character of the EE methods available. In addition, selecting appropriate elements from the multitude of available and emerging architecture frameworks (AFs) in order to model and manage the given EE undertaking is a non-trivial task. This chapter proposes a way to assist the inference of processes and to facilitate the selection and use of AF elements needed to accomplish EE projects. This is accomplished by assessing and organising AF elements into a structured repository (SR) using a generalised architecture framework (ISO15704:2000 Annex A) and by providing a method to create methods (a meta-methodology) for specific EE tasks that also guides the selection of AF elements from the SR. A brief introduction outlining the previously mentioned EE problems is followed by the description of the meta-methodology principle and of the assessment reference used. Next, a case study presents a sample application of the meta-methodology for a real EE project. The chapter closes with conclusions on the presented approach and a description of further work to refine and enrich the meta-methodology.
IntroductIon
Typically, the scope of enterprise engineering (EE) projects requires significant resources and involves large turn-around periods. Therefore,
such projects should be approached using suitable and mature methods, modelling constructs, and tools. EE practice in the virtual enterprise (VE) domain (Globemen, 2000-2002) has shown that often, the initial problem in an EE project is the
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
lack of a clear image of the activities that need to be performed to manage and execute that project. The currently available public and proprietary EE methods are quite generic, resembling reference models that need to be customised for specific projects; this typically requires knowledge of those methods (Noran, 2003a). EE artefacts typically required by EE projects, such as modelling frameworks (MFs), reference models (RMs), modelling constructs (languages), and tools, etc., can be provided in an integrated manner by architecture frameworks (AFs). Note that the term architecture framework is understood in this chapter as an artefact defining the types of elements needed to support the creation of an object from the identification of the need to create that object through to its decommissioning. However, often the artefacts composing a single AF do not provide sufficient coverage for a specific EE project and thus, a combination of elements from several AFs is necessary. The complexity involved in most EE tasks makes the selection of AF elements a non-trivial task, usually requiring knowledge of the elements outcomes, prerequisites, and dependencies on other AF elements. This chapter proposes a basic method to guide the creation of a set of activity type descriptions expressing what needs to be done in a particular EE project, based on domain knowledge (i.e., based on project stakeholder/champion knowledge about the participating entities and their relations). The proposed method also assists in the selection of suitable AF elements for the specific needs of the particular EE project, based on their capabilities assessed in relation to a reference AF. Note that the method and the reference AF used in this example do not prescribe the use of any specific AF or AF elements; they provide a way to assess AF element capabilities, to present a set of steps that specify types of activities needed to accomplish specific EE tasks and to
recommend sets of AF elements suitable for those tasks; it is then up to the user to select specific AF elements out of ranked lists, or override the recommendations. Therefore, this approach could be reused by EA practitioners to evaluate and select their preferred AF elements and to assess other methods for applicability to their specific EE project(s).
40
Methods: generality
Several methodologies associated with, or relating to AFs have been reviewed in Noran (2003a), such as the Purdue methodology, (published as a Handbook for Master Planning (Williams, Rathwell, & Li, 2001)), the structured approach of the GRAI integrated methodology (Doumeingts, Vallespir, Zanettin, & Chen, 1992), the CIMOSA methodology (Zelm, Vernadat, & Kosanke, 1995), Zachman foresight (Zachman, 2000), and Popkin process (Popkin Software, 2001), the six-step C4ISR process (C4ISR Architectures Working Group, 1997), and ARIS house/house of business engineering (Scheer, 1998a, 1998b). The review has found that all methods display various degrees of generality, reflecting the parent AFs aim to have broad applicability. However, for this reason the available methods are rather reference models of methods that need to be customised for each particular EE project. It has also been found that knowledge of these methods is required in order to decide on their selection and to subsequently customise them for the specific EE task.
tency by integrating the views contained in their MFs (e.g., C4ISRs core architecture data model, Zachmans metamodel (Sowa & Zachman, 1992), and ARIS high-level metamodel (Scheer, 1999).
Models: consistency
A given EE task typically requires several enterprise models focusing on specific aspects. This creates the issue of consistency between the models created. For example, if the functionality of the enterprise is expressed in an activity/process model, the inputs/outputs, resources, and controls of the activities represented in that model could also be described in information, resources, and organisational models. In that case, it is imperative that the various descriptions of the same artefact are kept in agreement. Typically, this is no easy task and can be enforced by the users via policies (weak), triggers, and procedures (medium), or through more formal means such as meta-models underlying modelling constructs (strong). Some of the reviewed AFs aim to ensure such consis-
41
more generic RM needs to be customised before being used for a specific EE task. Knowledge of the RM is needed, either to be able to use a specialised RM, or to customise a generic one. RMs also vary greatly in their ability and efficiency to cover various life cycle phases.
step, taking into account the applicable aspects and life cycle phases.
evALuAtIon And seLectIon of ArchItecture frAMework eLeMents the Architecture framework Assessment reference
The ISO15704:2000 standard, Requirements for enterprise reference architectures and methodologies, has been developed to supply a generic set of criteria to test the ability of existing AFs to provide relevant assistance for EA tasks. Annex A of the standard, the generalised enterprise reference architecture and methodology (GERAM, see Figure 1) is a generic AF compliant with ISO15704, obtained by generalising concepts present in several mainstream AFs and in EA best-practice. Note that GERAM only specifies requirements for tools, methods, and models; it does not enforce any particular choices to satisfy these requirements.
proposed solution
The previously described issues can be addressed in two main steps. First, evaluate and organise AF elements in respect to a generalised reference AF. Second, develop a method guiding the discovery of the processes involved in accomplishing EE tasks and supporting the user in selecting suitable AF elements for those tasks. These two steps have been addressed in the meta-methodology (method to create methods) research described by Noran (2004a). Thus, one of the main meta-methodology components is a structured repository containing elements of several AFs assessed in respect to ISO15704:2000 Annex A (ISO/TC184, 2000) as a common reference. The other major component is a set of steps assisting the inference of activity types that need to be undertaken for specific EE tasks. The meta-methodology steps use the repository content to build ranked lists of AF elements recommended to the user for each
GERAM Components
A main component of GERAM is its reference architecture (GERA), whose MF features a threedimensional structure containing several views that may be used to structure the knowledge in various interrelated models (refer Figure 2). GERA does not enforce the presence of all views; also, other view types can be added if necessary. The condition however is that the views that are present must together cover the necessary aspects of the specific EE task. Thus, the user is presented with a list of possible views and must make informed decisions as to which views are indeed necessary for the task at hand. GERA is further described in the next section. ISO15704:2000 specifies a requirement for compliant AFs to have associated methods (ex-
42
EEM
1..* 1..* Enterprise Engineering 0..* 1..*
Methodology
Describes process of enterprise engineering
EML
Enterprise Modelling Language
Provides modelling constructs for processes, technologies and human role
employs
utilises
0*
1..* 0..*
GEMC
Generic Enterprise Modelling Concept
Defines the meaning of enterprise modelling constructs
EET
Enterprise Engineering Tool
Supports Enterprise Engineering
0..* supports
used to build
PEM
Partial Enterprise Model
Provides reusable reference models and designs of processes, technologies and human roles
0..*
supports
0..* 1..*
EM
Enterprise Model
Supports Enterprise Engineering
is a kind of
EMO
Enterprise Module
Provides implementable modules of operational processes, technologies and human professions
EOS
0..* used to implement 1..*
Enterprise Operational System
Supports the operation of the particular Enterprise
emplified in GERAM by enterprise engineering methodologies (EEMs)) guiding the user in utilising their elements. The level of specialisation of such methods can be assessed by using GERAs MF Instantiation dimension (see next section). Enterprise modelling languages (EMLs) provide the necessary constructs to describe the various artefacts present within GERAM. For example, EEMs represent the models of engineering processes by means of EMLs. Typically, a combination of EMLs has to be used to describe all necessary modelling aspects (information, function, organisation, behaviour, etc.) of an EE project. GERAM calls RMs partial enterprise models (PEMs)reusable templates for human roles (organisational), processes (common functionality), or technology (e.g., IT resources). Enterprise models (EMs) are the main vehicle for structuring the knowledge existent in the enterprise (e.g., by modelling the AS-IS state) but are
also essential enablers of the change processes that may have prompted their creation (by modelling TO-BE states). A typical set of EMs as required by ISO15704:2000 and described by GERAM should include enterprise operations, organisation, IS and resources, and clearly show the human role within the control and production systems. Further detail, such as hardware/software may also be required depending on models intended use (see the GERA views in Figure 2). Enterprise modules (EMOs) are implemented RMs, usable as trusted plug-and-play components. For example, if a design has used certain RMs, the EMOs corresponding to those RMs can be directly used in the implementation of that design.
gerA structure
GERA is a life cycle reference architecture (i.e., an architecture that can specify types of activi-
43
ties involved in the implementation of a project spanning over part, or the entire life of an entity; in contrast, a system architecture only models the structure of an entity (system) at a certain point in time). GERA contains an MF (represented in Figure 2) and other concepts such as life history, entity recursiveness, and so forth. Generally, an MF is a structure containing placeholders for artefacts needed in the modelling process. Depending on the structure of the framework, the type of these artefacts may be limited to models, or may extend to other construct types such as RMs, metamodels, glossaries, etc. For example, the GERA MF contains placeholders for artefacts of the types shown in the GERAM metamodel (see Figure 1). The GERA MF allows the practitioner to focus on certain aspects of complex EMs by using views defined by several criteria, as further described. The model content criterion provides four views describing the functional, information, resource, and organisation aspects of an enterprise. It is to be noted that the organisation view may
Instantiation
Identification Concept Requirements Prelim. design Design Detailed design Implementation Operation Decommission Machine Human Resource Organisation Information Function Management and Control Product or Service Software Hardware
be obtained by mapping part of the resource view (human side) onto a subset of the functional view (the human-implemented functions). The purpose criterion divides the EE artefacts into production (or customer service) and control (or management). Typically (although not mandatory), this division is present when representing the relation between the life cycle phases of various enterprise entities in the business models used in meta-methodology application. The implementation criterion provides a way to distinguish between the production/service and the management/control aspect of an enterprise, while at the same time allowing to represent the extent of the human-accomplished tasks (humanisability) in both aspects. The human role is an essential success factor in EA, although it is often either overlooked or has only limited coverage in the AFs and RMs currently available. Finally, the physical manifestation criterion provides a finer subdivision, setting apart hardware and software aspects of EA artefacts. It is mostly used to scope views derived from other criteria. The second dimension of the GERA MF contains the concept of specialisation, which allows it to represent all of the previous aspects at the generic, partial, and particular levels (see Figure 2). For example, the partial level of GERA can be used to assess the coverage and degree of specialisation of RMs (PEMs) or methods (EEMs). Life cycle represents the third dimension of the GERA MF, allowing it to represent (and assess) the applicability of AF elements to various life cycle phases of the modelled entity. For example, this dimension enables the creation of business models in the context of the life cycles of the participating entities, which is an essential meta-methodology requirement. Several other GERA artefacts reside outside its MF. For example, the concept of life history can be used to model process concurrency. In GERA, life history implies a time dimension and represents the collection of life cycle phases
44
that the entity has gone (or will go) through during its life. In contrast, life cycle abstracts from time and is a collection of life cycle phases that the entity could go through during its life. In conclusion, GERAM provides a suitable reference for assessing the pool of AF elements needed to construct a repository and support the meta-methodology application.
Knowledge Base
AF Elements
Rule
Find AF Elements w. Outcomes matching Prerequisites
Rules Rule
Order AF Elements: - least prerequisites - multiple use - specialisation - part of family - integrated family
their potential applicability domain(s) in terms of views, life cycle, and specialisation. The assessed and mapped AF elements have then been stored in a knowledge base (KB) organising AF elements by name, type, family, integration, tools, and importantly, associating prerequisites and outcomes to each AF element. The KB has then been added rules for the selection of the AF elements and their ordering in ranked lists, resulting in the rule-based KB shown in Figure 3. The subsequent addition of an inference engine to the KB has resulted in the structured repository (SR) currently used by the meta-methodology concept (see Figure 5, left). For example, the representation of a GRAI Grid decisional RM (explained elsewhere in this chapter) includes its name (=GRAI Grid), type (=Reference Model), whether it belongs to a set of reference models (YES, =GRAI), if the set is integrated (NO not formally), and whether the RM is supported by any available tools (YES, =IMAGIM). The main outcome of the GRAI Grid RM representation in the KB would be decisional modelling. However, GRAI Grid RMs can be also used for organisational modelling if the human resources have been previously mapped. Therefore, this GRAI Grid RM could also have an organisational modelling outcome, however associated with a resource modelling prerequisite. The mapping of the AF elements on GERAM and GERA has revealed that typically, elements of several AFs can cover a particular area of an EE project. However, their efficiency in modelling the area in question may vary greatly in respect to various aspects and life cycle phases. For example, GRAI Grid would be quite efficient in modelling the decisional/organisational structure for the concept, requirements, and architectural design of an entity, but less efficient for the detailed design, implementation, or operation of that entity. Therefore, the inference engine would create ranked lists of matching AF elements for the specific task; the user can then accept or override recommended choices and thus test various scenarios.
45
3.
entities, while re-assessing the need for the presence of each entity in the diagram, and the extent of life cycle set to be represented for each entity (e.g., full set, single phase, etc). Reading the life cycle diagram of the target entity, phase by phase, infer a set of activities describing the creation of the entity and the roles played by other entities. For several target entities, determine the order in which they are influenced (from the relations in the diagram) and create the activity model in that order. Detail the activities to the necessary level using the aspects adopted and, if applicable, the views of a suitable MF.
The sub-steps relating to all the main steps are as follows: a. Identify a suitable MF if applicable. Choose the aspects to model, depending on the meta-methodology step. Resolve any aspect dependencies.
2.
How to ?
Domain Knowledge
Structured Repository
1 2 3 4 5 6 7 8 7
1 2 3 4 5 6 8
1 2 3 4 5 6 7 8
Entity E1: the large Farmer / association Entity E2: the small / medium Carrier Entity E3: the large Wholesaler Entity E4: the small / medium Retailer Entity E5: the Food Plant / Processor Entity E5: the Commodity Handler
2 3 4 5 6 7 8
E1
E2
E3
E4
Entity List
Business Model
Activity model
Meta-methodology
Specific method
46
b.
c.
Choose whether to represent only the present (AS-IS), future (TO-BE), or both states. If both, choose whether to represent them separately or combined. Choose modelling formalism(s) depending on the aspect(s) selected and on modelling best-practice criteria, such as: previously used in the modelling, specialisation in those aspects, potential multiple use, part of a family, family integration. Choose modelling tool depending on formalism and other factors (such as belonging to a suite, availability, etc).
user to select appropriate aspects and modelling formalisms in order to enforce a degree of coherence to the activity inference process. However, specific conclusions and insights gained by the user in steps 1 and 2 should also be used to select and (if warranted) even override step 3 recommendations. In conclusion, the meta-methodology concept implies constructive assistance, rather than blindly following a set of fixed steps that automatically lead to a unique, best solution.
The application of these steps is illustrated in a case study presented further in this Chapter. In building the activity model (step 3), a sufficient level of detail is reached when the processes can be directly executed by the envisaged resources. Note that the main aim of this chapter is to incite reader interest in the potential meta-methodology reuse and application to other EE tasks, rather than to provide a full description of the meta-methodology development and use. The interested reader is invited to get further metamethodology details from (Noran, 2004a).
47
Knowledge Base
AF Elements
Inference Engine
ion s nt An Ste sw ers p Select AF Elements lar Particu Metaing Sett
&
Cu
Qu es t
rre
Rule
Find AF Elements w. Outcomes matching Prerequisites
Rules
Rule
Order AF Elements: - least prereqs - part of family - integrated family
Dynamic facts (specific to the particular setting) that cannot be stored in the KB, such as staff proficiency in particular modelling languages and modelling tools, available/legacy systems, and other relevant constraints within the participating organisations are gathered from the user at runtime and are used in ranking the AF element lists.
48
cessfully tender for such projects often become collaborative networked organisations (CNO) forming a collaborative network (Camarinha-Matos, 2004) or a company network (CN) (Globemen, 2000-2002) (see Figure 6). Such a CN provides a breeding environment where the participants
can accomplish the previously described processes in advance and thus improve their preparedness to quickly form VOs as required.
Figure 6. Company network and virtual organisation concepts (Globemen, 2000-2002; Tlle & Vesterager, 2002)
Company Network Competencies Virtual Organisation
Virtual Organisation
Figure 7. AS-IS and possible TO-BE state (organisational scenarios also shown)
AS-IS Legend:
FAC: Faculty (BE?) ======================= AD: schools within FAC L1.. L3: physical locations ======================= ITM: Schools merger project ======================= MS: Merged School (VO) ======================= HOS: Head of School DHOS: Deputy HOS PA: Personal Assistant SAO: School Admin Officer =======================
L1
L2
C (L1)
B (L3)
D (L3)
FAC
ITM
TO-BE 1
L1
L2 MS
PA
L3
C (L1) D (L3)
FAC
a) Dean FAC PA c) DHOS L1 PA SAO c) DHOS L2 PA SAO% a) HOS MS c) DHOS L3 PA SAO HOS C HOS D b)
Organisation:
One FAC Dean, one HOS of MS and a DHOS on each MS campus a) Dean FAC and HOS MS are distinct b) Dean FAC is also HOS MS c) HOS MS is one of the DHOS, nominated by rotation or ProVice Chancellor
Preferred Model
49
The problems previously described could be resolved by Schools A and B forming a VO (called merged school (MS) in the TO-BE state in Figure 7) with cross-campus management and policies ensuring inherent consistency in the strategy regarding the products delivered and the resources allocated to future VO campuses at L1, L2, and L3. The individual campuses are set to retain most of their internal decisional and organisational structure except for the highest layer, which will be replaced by the VO governance structure. In view of the CN/VO model previously explained, in this case study the CN function is performed by FAC, which contains several schools forming VOs as necessary. The partners (i.e., schools) A and B within the CN come together at the initiative of U to form an on-going VO project. Importantly, the partners cease to operate independently during the life of MS.
Sub-step c: Choose text representation as modelling formalism. Choose a plain text editor or whiteboard as tool. Motivation: Formalism and tool must preserve simplicity (see a above).
The list of entities constructed in this step is shown in the legend of Figure 10.
50
mined the choice of separate AS-IS and TO-BE representations. Sub-step c: Choose modelling formalisms ranking highest in efficiency for the aspects selected in sub-step a. For life cycle and management/service, choose a chocolate bar formalism derived from GERA as shown in Figure 8.
Choose the GRAI Grid formalism (Figure 9) for decisional and organisational aspects. GRAI Grid ranks high in respect to other candidate languages due to its specialisation for the decisional aspect, potential multiple use (e.g., for organisational aspect), and no prerequisites. Next, construct the business model (Figure 10) illustrating entity roles in accomplishing the
Figure 8. Modelling formalism used for the life cycle and management vs. service/product views of the business model
Views
GERA MF
Formalism used
P M Id C R PD
Instantiation
Identification Concept Requirements Prelim. design Design Detailed design Implementation Operation Decommission Machine Human Resource Organisation Information Function DD I Op D Management and Control Product or Service Software Hardware
LC phases
Entity
Figure 9. GRAI Grid modelling formalism for decisional aspects (mapped organisational roles show possible use for organisational modelling)
Ext. Info Strategic
Horizon Period
Products
Plan
Resources
Decision Centre (DC)
Int. Info
Role 3
Tactical
Horizon Period Role 4 Role 1
Operational
Horizon Period
Role 2 Information Aggregation Information Link (IL) Decision Framework (DF) = information flow (IF)
Control
Horizon Period Legend:
51
EE project in the context of their life cycles and management vs. production/service aspects. The only candidate specialised tool for decisional/organisational models is IMAGIM. Due to costs and availability, a simple graphical editor has been used, thus, the consistency of entities showing in both decisional and organisational models had to be ensured by the user. The business model in Figure 10 allows a birds eye view on the entities involved in the target entities life cycle phases and has been constructed using the domain knowledge of the stakeholders as elicited by the user. Several entities influence various life cycle phases of MS directly, or through other entities. The main influence is exercised by ITM, which is in fact a project set up to build the VO and ceases to exist after MS starts operating. Note that this is a common occurrence in EE projects, reflected in the body of step 1 of the meta-methodology. The AS-IS decisional model (Figure 11) has shown in more detail some problems that have triggered the EE project, such as a high degree of turbulence and a lack of clear and effective
strategy within the organisation. Thus, the Head of School (HOS) in the role of planner had to put out fires (product/resource discrepancies requiring immediate reconciliation) on a short-term basis, rather than having strategies in place to avoid the cause of such problems. This can be seen in Figure 11 in the form of decisional frameworks (DFs) flowing from planning toward products and resources at all horizons. The AS-IS decisional model has also shown a lack of sufficient financial and decisional independence of the schools A and B and a shortage of information crucial to long-term strategy making (shown in Figure 11 by several DFs coming from outside the School and by limited external information flow). The TO-BE decisional model (see Figure 12) has attempted to address these problems by confining the authoritarian role of the HOS to the strategic level, by increasing the financial and decisional independence of the target VO (MS), and by providing the necessary external information to MS for the purpose of strategy making and self-governance. This is reflected in a lesser number of horizontal DFs originating from
Figure 10. Business model expressing entity roles in accomplishing the EE project
P Id C R PD DD I Op D AP M UA
UP
FAC
I1
I2
Legend:
ACC: Across Campus Consistency Project; ACCR: Reviews of the ACC A, B: Schools forming CNO (MS) MS: Merged School; I1, I2: Spin-off organisations (virtual or not); GA: University Act U: University; UP: University Project; AP: Academic Plan; FAC: Faculty within the U; ITM: Schools Merger Project
ACCR
ACC
MS
ITM
52
PVC, Academic Committee GU Act, Council, Acad. Committee Uni / PVC Policies HRM Uni Policies Uni./ Faculty / PVC INS Univ. Room Booking Faculty / PVC Commercialisation Office
Research
Internal Information
GU Act, Strategies on Project, Acad accreditation, new / Plan, enrolmnet discontinued programs / forecasts, courses, InternationaGovt policies, lisation, fees, prev studies credit, OP, marketing CRC / industry market trends approach, proc. improvement Strategy on GU Institutes, grants WOB strategy applications, (institutes, groups, CRC participat., individuals) research profile HR staffing strategy (academic profile, ratio to general / sessional, joint appointments, HR management, etc) Negotiate yearly budget Hire, supervise manage consult RHD sships. conf. travel, sessional staff General and Sessional Staff supervision /
Academic Plan, Marketing approach and OP Research plans market analysis, adjustments, propose / revise SQI, IIIS, CRC participation, stud. enrolment programs / Majors, fees, comb degree / grants, journal figures, service teaching, student conference community, publications demographics services, prev studies credit Allocate teaching / research / WOB, non-salary budget within campus
Performance Upgrade Venue / evals / product com labs transport reports, schoolspecific stud. / staff upgrade enrol., retention management (recruit, train, etc) comp alloctn expenditure, staffing
Local / Prof. Semestrial corrections on Seminar planning. Community & service / combined degree Plan adjustments WOB WOB depending on adjust. for adjust. MP,Council, etc and summer teaching, web content mgmt, submission Institutes for indiv feedback, grants majors, acceptances, (SQI) / groups awarded, papers student services grants awarded accepted, Workload / nonsalary budget allocation adjustments (campus)
Sessional, conf. travel Manage, adjustments, supervise, misc expenses consult (resrch lunch)
Teaching evaluations, Manage Adjust replace- venue / student results, ments, transport progress upgrades alloctn. indicators
Manage short-tem / unexpected knowledge Manage teaching material / dissemination assessment items events (seminars, presentations, etc)
Manage unexpected staff issues Venue / transport Student / staff (e.g. unavailability, surge in / computing feedback, demand) maintenance events
Control WOB
N/A
Control budget
N/A
Control infrastructure
= decisional framework (DF); = info. link (IL); = Staff Committee; = Travel Committee;
53
54
GU Act, Council, Acad. Committee Faculty / PVC Commercialisation Office Negotiated Rules of P/R allocation HRM Uni Policies INS Univ. Room Booking Faculty / PVC
Internal Information
GU Act, Strategies on Project, Acad accreditation, new / Plan, enrolmnet discontinued programs / forecasts, courses, InternationaGovt policies, lisation, fees, prev studies CRC / industry credit, OP, marketing market trends approach, proc. improvement Strategy on GU WOB strategy Institutes, grants (institutes, groups, applications, individuals) CRC participat., research profile Allocate workload, non-salary budget across campuses Negotiate yearly budget Hire, supervise manage consult` RHD sships. conf. travel, sessional staff General and Sessional Staff supervision / Allocate teaching / research / WOB, non-salary budget within campus
Infrastructure HR staffing strategy (academic Strategy, eg profile, ratio to general / GRID, common sessional, joint appointments, labs, other school HR management, etc) venues, transport
Academic Plan, market analysis, stud. enrolment figures, income generated, community, demographics Marketing approach and OP Research plans adjustments (coordinated), SQI, IIIS, CRC propose / revise programs / participation, Majors, fees, comb degree / grants, journal service teaching, prev studies conference credit, student services, publications Decide WOB for institutes Decide WOB for indiv / groups
Performance Upgrade Venue / evals / product com labs transport reports, schoolspecific stud. / staff upgrade enrol., retention management (recruit, train, etc) comp alloctn expenditure, staffing
Local / Prof. Community & Seminar planning. Semestrial corrections on MP,Council, etc Plan adjustments service / combined degree feedback, grants WOB adjust. for depending on and summer teaching, web indiv / groups awarded, papers submission content mgmt, majors, accepted, acceptances, student services income grants awarded generated Workload / nonsalary budget allocation adjustments (campus) Sessional, conf. travel adjustments, misc expenses (resrch lunch)
Teaching Hire / lay- Hire / Manage Adjust evaluations, off as lay-off replace- venue / student results, as ments, transport needed needed upgrades alloctn. progress indicators
Manage short-tem / unexpected Manage teaching material / knowledge assessment items dissemination events (seminars, presentations, etc)
Manage unexpected staff issues Venue / transport Student / staff (e.g. unavailability, surge in / computing feedback, demand) maintenance events
Figure 12. Preferred TO-BE decisional and organisational situation (GRAI Grid model)
N/A
Control budget
N/A
Control Infrastructure
= NAT&LG / GC decisional centre (DC); = CINT DC; = DHOS / Campus Commitee; = Staff Commitee;
= decisional framework (DF); = info. link (IL); = Travel Commitee; =Equipment Committee;
= Executive Committee;
planning, less DFs coming from U and increased number of information flows in Figure 12. Also, some existing external DFs have been relocated so as to minimise the negative impact on MS. Figure 11 and Figure 12 show the AS-IS and TO-BE decisional and organisational models. Interestingly, the TO-BE decisional model has been found to match all potential scenarios, with differences only obvious in the organisational structure derived from the decisional model (i.e., the allocation of the various human resource groups to the decision centres [e.g., see areas defined as committees in Figure 12]). Therefore, modelling the organisational structure was instrumental in distinguishing between the available TO-BE options.
Sub-step a: Aspects: functional and life cycle, but use other categories to detail activities. Motivation: The main deliverable is an activity model, hence functional. However, the activities must be detailed using aspect from the SR and views from the selected AF, in this case management/service with human vs. machine and software vs. hardware aspects. Sub-step b: Choose to represent both AS-IS and TO-BE states in a unified representation. Motivation: The activity model is expressing the transition from AS-IS to TO-BE, thus both states should be represented; here, separate views did not justify the consistency overhead. Sub-step c: Choose IDEF0 (NIST, 1993) functional modelling formalism (see Figure 13 for a basic explanation of its elements). Select AI0Win tool by Knowledge-Based Systems, Inc. Motivations: UML and IDEF0 are both suitable; UML ranks higher than IDEF0, due to integrated metamodel present and wider tool support. However, the available (AI0Win) modelling tool and necessary skills were an overriding factor. AI0Win is also semi-integrated with information/resources modelling (SmartER) and behaviour modelling (ProSIM) tools, similar to a suite, thus ensuring some degree of model consistency. Therefore, overall IDEF0 and AI0Win were considered a suitable choice in this particular case.
Outputs
(results of activity)
Activity
O1 O2
Mechanisms
M1 M2 (who / what makes it happen)
55
Figure 14. IDEF0 Activity model for the VO creation and operation (2nd level shown)
56
controls, outputs, and mechanisms (ICOMs) are defined for these activities (see Figure 13, where inputs can be omitted if justified). Therefore, the user has to give consideration to what (if anything) is used in the activity, what controls it, what is produced by the activity and who/what executes it. This information can be construed from the roles shown in the business model and further domain knowledge. Each activity must be recursively decomposed down to a level where it can be directly executed; this can be assisted by a checklist of views used in previous steps and/or the chosen MF (if any) and/or available in the MFs contained in the SR. For example, if GERAs MF is chosen, the checklist contains function, information, resources, organisation, management vs. production/service, human roles, and hardware/software. For example, in Figure 16, management vs. production/service and human role views have been used to decompose the detailed design activity.
Note that not all aspects are relevant to all life cycle phases. For example, early life cycles (e.g., identification, concept) require few or no aspects, and the human aspect may only be visible/relevant in the preliminary/detailed design phases, such as illustrated in Figure 2.
Figure 15. Decomposition of the requirements activity (3rd level IDEF0 model)
57
Figure 16. Decomposition of the detailed design activity (3rd level IDEF0 model)
not need to be represented in the activity model in this case. The concept phase is accomplished under the control of the mandate from PVC, ACC reviews that show what needs to be addressed and Us policies. The work to define the concept of MS is carried out by a working party composed of U staff, the majority of which are in fact also staffing the ITM project. No inputs are present. The outputs reflect the creation and refinement of the MS concept, such as goals, objectives, and responsibilities of the MS. The main changes brought by this EE project are in the management area. Thus, the requirements definition process needs to investigate suitable management structures and in addition, make needed corrections to the MS concept. For this purpose this activity needed to contain the
creation and use of decisional / organisational frameworks (such as shown in Figure 11 and Figure 12). These sub-activities are shown in Figure 15. In this case study, only organisational models were able to discern between various TO-BE states. Therefore, the preliminary design phase must develop organisational structures reflecting various scenarios and recommend/seek stakeholders approval for the optimal one. The detailed design activity was further decomposed according to the GERA implementation criterion, thus showing management vs. production/service and human roles, as shown in Figure 16. Further decompositions then discerned between hardware and software-oriented activities. (Noran, 2004a) contains the relevant diagrams.
58
The VO implementation process must set up the transition process and then implement the detailed specifications produced by the detailed design sub-activities (thus some of its decomposition was similar to detailed design activity). In this case, the operation process of the School can be decomposed in operation and monitoring (producing internal information for the management and requests for change that cannot be handled at operational level). The EE project did not include a detailed operation of the VO, thus no decompositions below level three have been produced for this activity. A full description of the activity model creation and structure (which is beyond the purpose of this chapter) is contained in Noran (2004b). Note that the activity model created represents only one of the many possible suitable solutions to this EE problem.
particular project but also the host organisations specific proficiencies, legacies, and culture. This chapter has described a method aiming to assist the discovery of activity types involved in accomplishing specific EE tasks and to provide guidance for the selection of AF elements needed to model and manage those tasks. The proposed meta-methodology achieves these goals through a meta-methodology environment comprising a set of steps and an SR containing AF elements assessed and organised in respect to a suitable reference (GERAM). Research currently in progress aims to implement the KB and SR in a Web-based, open source expert system for possible use as a decision support system for upper/middle management. Future research efforts in this area will be focused toward formalising the meta-methodology environment and enriching the content of the KB by mapping additional AF elements against the chosen reference. Further field-testing and refinement of the KB rules and meta-methodology steps is also needed in order to improve its accuracy and usefulness.
references
C4ISR Architectures Working Group. (1997). Command, control, communications, computers, intelligence, surveillance, and reconnaissance C4ISR. Retrieved 2004, from http://www.cisa. osd.mil Camarinha-Matos, L.M. (2004). Virtualenterprises and collaborative networks. Proceedings of IFIP 18th World CongressTC5/WG5.5 (PROVE 04): 5th IFIP Working Conference on Virtual Enterprises). Toulouse / France: Kluwer Academic Publishers. CIMOSA Association. (1996). CIMOSAOpen system architecture for CIM. Technical Baseline, ver 3.2. Private Publication.
59
Department of Defence Architecture Framework Working Group. (2003). DoD architecture framework. Retrieved 2004, from http://aitc. aitcnet.org/dodfw/ Department of the Treasury CIO Council. (2000). Treasury enterprise architecture framework (v.1). Washington, DC: Department of Treasury. Doumeingts, G. (1984). La Methode GRAI. Unpublished Doctoral Thesis, University of Bordeaux I, Bordeaux, France. Doumeingts, G., Vallespir, B., & Chen, D. (1998). GRAI Grid decisional modelling. In P. Bernus, K. Mertins, & G. Schmidt (Eds.), Handbook on architectures of information systems (pp. 313-339). Heidelberg: Springer Verlag. Doumeingts, G., Vallespir, B., Zanettin, M., & Chen, D. (1992). GIM-GRAI integrated methodologyA methodology for designing CIM systems. Bordeaux: Version 1.0, Unnumbered Report, LAP/GRAI, University Bordeaux 1. Globemen. (2000-2002). Global engineering and manufacturing in enterprise networks (IMS project no. 99004 / IST-1999-60002). Retrieved from http://globemen.vtt.fi/ GRAISoft. (2002). IMAGIM software product. Retrieved August 2002, from http://www.graisoft. com ISO/TC184. (2000). Annex A: GERAM. In ISO/IS 15704: Industrial automation systems - Requirements for enterprise-reference architectures and methodologies. Levi, M. H., & Klapsis, M. P. (1999). FirstSTEP process modelerA CIMOSA-compliant modeling tool. Computers in Industry, 40, 267277. Menzel, C., & Mayer, R. J. (1998). The IDEF family of languages. In P. Bernus, K. Mertins, & G. Schmidt (Eds.), Handbook on architectures of
information systems (pp. 209-241). Heidelberg: Springer Verlag Berlin. NIST. (1993). Integration definition for function modelling (IDEF0) (No. 183: Federal Information Processing Standards Publication): Computer Systems Laboratory, National Institute of Standards and Technology. Noran, O. (2003a). A mapping of individual architecture frameworks (GRAI, PERA, C4ISR, CIMOSA, Zachman, ARIS) onto GERAM. In P. Bernus, L. Nemes, & G. Schmidt (Eds.), Handbook of enterprise architecture (pp. 65-210). Heidelberg: Springer Verlag. Noran, O. (2003b). UML vs. IDEF: An ontologyoriented comparative study in view of business modelling. In I. Seruca, J. Filipe, S. Hammoudi, & J. Cordeiro (Eds.), 6th International Conference on Enterprise Information Systems (ICEIS 2004) (Vol. 3, pp. 674-682). Porto / Portugal: ICEIS. Noran, O. (2004a). A meta-methodology for collaborative networked organisations. Unpublished Doctoral Thesis, School of CIT, Griffith University. Noran, O. (2004b). A meta-methodology for collaborative networked organisations: A case study and reflections. In P. Bernus, M. Fox, & J. B. M. Goossenaerts (Eds.), Knowledge sharing in the integrated enterprise: Interoperability strategies for the enterprise architect (Proceedings of International Conference on Enterprise Integration Modelling and Technology ICEIMT04). Toronto, Canada: Kluwer Academic Publishers. Popkin Software. (2001). Building an enterprise architecture: The Popkin process. Retrieved October 2002, from www.popkin.com Rumbaugh, J., Jacobson, I., & Booch, G. (1999). The unified modelling language reference manual. Reading, MA: Addison-Wesley.
60
Scheer, A. W. (1992). Architecture for integrated information systems. Berlin: Springer-Verlag. Scheer, A. W. (1994). Business process engineeringReference models for industrial enterprises. Berlin: Springer-Verlag. Scheer, A. W. (1998a). ARISHouse of business engineering. In A. Molina, A. Kusiak, & J. Sanchez (Eds.), Handbook of life cycle engineering Concepts, models, and technologies. Dordrecht: Kluwer Academic Publishers. Scheer, A. W. (1998b). ARISBusiness process modeling (2nd ed.). Berlin: Springer-Verlag. Scheer, A. W. (1999). ARISBusiness process frameworks (3rd ed.). Berlin: Springer-Verlag. Sowa, J. F., & Zachman, J. A. (1992). Extending and formalizing the framework for information systems architecture. IBM Systems Journal, 31(3), 590-616. The Open Group. (2006). The open group architecture framework (TOGAF). Retrieved Mar 2006, from http://www.opengroup.org/togaf/ Tlle, M., & Vesterager, J. (2002). VEM: Virtual enterprise methodology. In I. Karvoinen, R. van den Berg, P. Bernus, Y. Fukuda, M. Hannus, I. Hartel, & J. Vesterager (Eds.), Global engineering and manufacturing in enterprise networks (Globemen). VTT Symposium 224. Helsinki, Finland.
U.S. Federal CIO Council. (2006). Federal enterprise architecture framework (FEAF). Retrieved March 2006, from http://www.itpolicy. gsa.gov/mke/archplus/fedarch1.pdf Williams, T. J. (1994). The Purdue enterprise reference architecture. Computers in Industry, 24(2-3), 141-158. Williams, T. J. (1988). CIM reference model committee: A reference model for computer integrated manufacturing (CIM)A description from the viewpoint of industrial automation (2nd ed.). Research Triangle Park, NC: Instrument Society of America. Williams, T. J., Rathwell, G. A., & Li, H. (2001). A handbook on master planning and implementation (No. Report 160). West Lafayette, IN: Purdue Laboratory for Applied Industrial Control. Zachman, J. A. (1987). A framework for information systems architecture. IBM Systems Journal, 26(3), 276-292. Zachman, J. A. (2000). Zachman framework definition and enterprise architecture quick start. Retrieved June 2002, from www.zifa.com Zelm, M., Vernadat, F., & Kosanke, K. (1995). The CIMOSA modelling process. Computers in Industry, 27(2), 123-142.
61
62
Chapter IV
AbstrAct
Virtual enterprise (VE) has become a prime candidate to survive under the increasingly turbulent and competitive business environment. In order to quickly respond to the rapidly changing business environment, the agility and interoperability are regarded as the core requirements for the VEs. Unfortunately, there is no previous approach to fully support configurations of the agile and interoperable VE. The systematic modeling framework based on the meta-model driven approach could be used for business domain experts and developers to construct VE models quickly and systematically with insights. It should be noted that this chapter aims to present a systematic modeling framework itself, not to generate only instances of VE models. Based on the proposed framework, business domain experts and developers would configure all of VE models such as VE architectures, modeling languages, model transformations, and deployment models, as well as instances of VE models.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
INtrODUctION
Today, enterprises are facing a rapidly changing business environment and can no longer make predictable long-term provisions. Moreover, business competition is no longer enterprise to enterprise, but value chain to value chain (Cadence Design Systems, 2003). In order to respond to these business environments, most competitive enterprises seek to enhance competitive performance by closely integrating internal operations and effectively linking them with the external operations of suppliers, customers, and other business partners. As each enterprise operates as a node in the network composed of suppliers, customers, engineers, and other specialized service providers, collaborations among multiple business partners are becoming important (Barnett, Presley, & Liles, 1994; Camarinha-Matos & Afsarmanesh, 2003; Jagdev & Thoben, 2001). The virtual enterprise (VE), which is a collaborative network across the value chains, has become a key factor to survive under the competitive business environment. For efficient collaborations among the business partners of the VE, the agility and interoperability among heterogeneous enterprise models in different business domains of interests is required. The agility is the capability to flexibly adapt enterprise models of VE in order to cope with unanticipated business environments. The interoperability means seamless communications among enterprise models, which can be shared and exchanged. To guarantee the agility and the interoperability, participants of the VE must understand each other through EA of participant enterprise. The EA mean business components and their relationships that are required for business activities. Business components are things such as application, data, technology, and business architecture that require enterprise business. Hence, EA of VE describes business components and their relationship that are required by business partners.
In order to establish and manage an agile and interoperable VE, it is keenly necessary to develop a systematic methodology for configuration of a VE based on the collaborative business processes. It should be noted that the configuration of a VE in this chapter means not only the designing instances of VE models, but also the designing VE architecture, modeling languages, and deployed models. The goal of this chapter is to introduce a new systematic modeling framework that can be used for designing and managing the agile and interoperable VEs. The systematic modeling framework has a hybrid approach that harmonizes the up-to-date technologies such as enterprise architecture (EA), model driven architecture (MDA), meta-modeling approach, domain specific methodology (DSM), model transformation, framework-based development, and so on. It combines the advantages of the heterogeneous technologies so that it can produce integrated synergy effects, as well as it can take individual advantages of each technology. This proposed modeling framework provides modeling concepts that underpin the representation of all of the VE from different viewpoints, at different levels of granularity, generality, and abstraction during different life cycle of a VE. It would be used systematically by business domain experts and developers who want to design and manage a VE quickly and effectively. The rest of this chapter is organized as follows. Requirements of VE to Support the Agility and Interoperability Section, describes the requirements of the VE to support the agility and interoperability. Literature Review Section, reviews the related researches. In Systematic Modeling Framework for the Agile and Interoperable VE Section, we introduce our systematic modeling framework for the agile and interoperable VEs. Finally, Discussion and Conclusion Section, provides some conclusions and gives some suggestions for future work.
63
From the several previous definitions and keywords, the VE is considered as a temporary organization in which various distributed business partners form a cooperative network on the value chain. Therefore, it is important to establish a value chain systematically and quickly with core competitive functionalities that are the business processes in the form of the set of the service components of the business partners. Consequently, we re-define the following terminologies, the VE and the value chain, as follows: Virtual enterprise (VE): In order to realize the common business goal which is to secure business opportunity, the VE is an active collaborative organization structure which is temporarily made up of value chains. Value chain: A value chain is a comprehensive collection of all of the loosely-coupled business processes of distributed business partners who offer the core complementary functionality and resources.
Figure 1. Concept of VE
Higher-Level Virtual Enterprise
Business Development Chain Product Design Chain Supply Chain Sales & Marketing Chain
Wholesaling #1
Retailing #2
Customer
retailer #1
Product Manufacturer #1
retailer #2
64
According to these definitions, it is possible to understand the concept of the VE as Figure 1. The VE is made up of the hierarchical value chains and each value chain is recursively made up of the collaborative business processes, the lowerlevel VE, and the lower-level value chains. This composition manner among the VEs, the value chains, and the collaborative business processes is repeated recursively until these cannot be divided any more.
Requirements for VE
It has not been easy to develop and realize the VE due to several obstacles. Firstly, real business processes of VE are diverse and complex. Because their business processes are very contextdependent and resource-dependent, it is not suitable to apply a specific traditional methodology. The traditional methodology is too generic to be utilized for the specific type of business processes of a specific business domain (Harmon, 2003a). Secondly, VE has multiple stakeholders who are interested in different aspects of the enterprise models. In most cases, a number of the enterprise
models are distinguished separately, such as different perspectives and different views. But there is no comprehensive approach that enables the integrated enterprise modeling. Thirdly, business processes of VE are very distributed and heterogeneous across value chains. The applications in VE should be performed on distributed and heterogeneous platforms with different types of information and different levels of functionality (Zarli & Richaud, 1999). However, there is a lack of standard definitions and effective mechanisms, which are guaranteed the agility and interoperability of VE models. Therefore, it is necessary to develop a common modeling framework to settle the previously mentioned obstacles. It should provide a narrowfocused modeling approach for representing a specific business domain. On the other hand, it should also provide a coherent modeling approach that supports the representation of VE models from different viewpoints, at different perspectives during the life cycle of the VE, and it should provide a standard mechanism that supports the agility and interoperability of VE models on the heterogeneous platforms in the distributed network.
Virtual Enterprise
Collaborative or Complementary Organizations Networked or Distributed Organizations Optimized Organizations Innovative Organizations
Agility
Interoperability
65
LItErAtUrE rEVIEW
There is a research area for the integration of all knowledge that is needed to support the enterprise development, the enterprise management, and the enterprise integration. This research area is called enterprise engineering. Enterprise engineering can be used to support the life cycle of the VE (Vernadat, 1996). Each technology has been dealt in different interests and developed independently to address its own purpose. Even if they have the advantages in their own viewpoints, they have not provided a complete solution to support all aspects of the VE configuration. Therefore, it is keenly to develop a well-established common methodology to completely support the configuration of the agile and interoperable VEs through the VE life cycle. Focusing on the agility and interoperability of VE, we present a technology architecture that includes several technologies of enterprise engineering as illustrated in Figure 2. In this chapter, we consider that these relevant technologies play important roles in developing the systematic modeling framework for the agile and interoperable VEs.
EA Framework
A VE consists of business processes and various business components such as information, systems, organizations, and so on, which can be classified according to diverse levels and points of view. The term enterprise architecture (EA) refers to a comprehensive description of all of the key elements and relationships that make up an enterprise (Harmon, 2003b). In other words, the EA identifies the essential processes performed by the VE, and how the VE performs these processes, and includes methodologies for the rapid reconfiguration of the VE. As one of the earliest systematic frameworks, the Zachman framework (Zachman, 1987; ZIFA) is made up of
a number of other architectures that are focusing on different, specific areas of concern. The most extensive efforts in the development of reference architecture for a single enterprise have been undertaken by the generalised enterprise reference architecture and methodology (GERAM) (IFIP-IFAC Task Force, 1999). The GERAM framework includes harmonization with software engineering, system engineering, and the developments of frameworks such as Perdue enterprise reference architecture (PERA) (Williams, 1993), computer integrated manufacturing open systems architecture (CIMOSA) (Vernadat, 1993), GRAI integrated methodology (GIM), Zachman framework, and so on. Based on GERAM, virtual enterprise reference architecture (VERA) and its methodology is developed to enable rapid formation of customer-focused and customer-tailored VEs by taking advantages of information technology (IT) (Vesterager, Tolle, & Bernus, 2002). Although current EAs provide approaches to generations of EA models and products and to management procedure of EA models, they are missing the big picture. It means that they have no concept to inter-relate the relevant elements and have no integration mechanism for different views and different perspectives. Also, they have no collaboration mechanism for different value chains.
66
models. Another restriction is that generic purpose modeling languages are too general to correctly design the specific models of a specific business domain. As the business process-centric approach is becoming a major topic for all kinds of businesses, some of the following languages are emerging: the business process definition meta-model (BPDM) (Object Management Group, 2003a), business process modeling notation (BPMN) (Business Process Management Initiative, 2003), business process execution language for Web service (BPEL4WS) (Andrews et al., 2003), Web services description language (WSDL) (W3C, 2001), and business process modeling language (BPML) (Arkin, 2002). BPEL4WS, WSDL, and BPML are XML-based languages for modeling the business processes that are originated from platform specific process language. Recently, UML 2.0 has been developed and addresses many issues to make strides toward becoming the standard notation for depicting architectures (Object Management Group, 2003b, 2003c).
shifting the modeling concept from code levels to design levels. However, while MDA emphasizes presenting the architecture and the guideline for the meta-modeling, DSM emphasizes freely developing an abstract graphic language, which developers can use easily and accurately in the specific business domain. As DSM lacks integration mechanism currently, DSM cant provide really linking mechanism among narrowly domain-focused languages. DSM has a limitation to design, not only domain specific VE models, but also domain integrated VE models in order to support a coherent modeling.
Meta-Modeling Approach
As a meta-model means the rendering of a language definition as an object model, the metamodeling approach is becoming a standard way of defining and managing the meta-models that is used for designing the VE models. Therefore, it can be used for enabling the designed models and the defined meta-models to have the interoperability with each other. Recently, it has been demonstrated that the meta-modeling can be used to define concrete syntax and abstract syntax, as well as semantics. OMG has suggested the concept of UML profiles in the form of the extended UML meta-model to make good use of the particular domains (Object Management Group, 2003b, 2003c, 2004a). It has been discussed how a UML profile can be defined for specific domains that require a specialization of the general UML mete-model in order to focus UML to more precisely describe the domain.
DsM
Since the VE models have the characteristics of complexity and diversity, as well as context-dependency and resource-dependency on the business domains, it is difficult to use the generic purpose modeling languages as it is. The DSM intends to freely develop abstract graphic languages that business domain experts or developers can easily and accurately use in a specific business domain in order to design and manage a model through shifting the modeling concept from code levels to design levels (Frankel, 2004; MetaCase, 2005). Consequently, the DSM lets developers use the knowledge and skills of business domain experts to design VE models easier. DSM is similar to model driven architecture (MDA), as they intend to design and manage a model itself in the business domain through
MDA
As the technology platforms of the VE continue changing quickly and the demands of integrating the heterogeneous legacy systems continue to grow, the MDA has created a buzz of interest by promising to increase the productivity, flexibility,
67
and portability of VE models (Object Management Group, 2002a). The MDA defines an approach that separates the specification of system functionality from the specification of the implementation of that functionality on a specific technology platform, and it also defines an approach for software development based on modeling and automated mapping of models to implementations. The MDA makes a distinction among the computation independent model (CIM), the platform independent model (PIM), and the platform specific model (PSM). According to this, it provides an open and technology-neutral approach to the challenge of business and technology change (Miller & Mukerji, 2003). The MDA also defines the 4-layer architecture for structuring the meta-modeling. It would be a sound foundation for this metamodeling approach in this chapter. Therefore, we define a meta-model in the form of UML profile at M2 (meta-model) layer. Although MDA is in the limelight of software engineering, there is no well-established concrete methodology for realizing MDA. To give an example, model transformation between PIM and PSM is indispensable in MDA. However, the mechanism or implementation for the model transformation is not thoroughgoing enough up to now.
their loosely coupled integration. Consequently, the framework-based development allows improving and accelerating the development of enterprise models in VE. The Supply Chain Council (SCC) established the supply chain operations reference model (SCOR) for the supply chain management domain (Supply Chain Council, 2003). In the domain of telecommunication, the next generation operations systems and software (NGOSS) are proposed by telemanagement forum (TeleManagement Forum, 2002). The instrumentation, systems, and automation society (ISA) have tried to standardize the processes in manufacturing execution system (MES) domain (Instrumentation, Systems, and Automation Society, 2004). However, as the current framework-based development does not separate each element of enterprise models such as business process, application, information, etc., they are too mixed-up and complex to assure agility and flexibility of the VE models. Thus, in this chapter, we bring component-based architecture and serviceoriented architecture in the framework-based development in order to manage independently the elements of enterprise models.
Framework-Based Development
The framework-based development is usually said to be the second generation business process methodology (Harmon, 2003a). Important efforts are dedicated to exploiting the best practices and the design patterns of the business processes, the business components, and the architectural frameworks for the coherent design and implementation. Since many quality properties such as the maintainability, portability, efficiency, reusability, etc., rely on framework-based development, it is essential to establish agile and interoperable VEs and
68
are distributed at business partners. And these business processes should be managed and controlled autonomously and in a distributed manner because each business partners can be in different places and different time zones.
Ontology Engineering
It is even the case that the business functionalities and information of the VE are not properly understood yet. In other words, the VEs usually have some problems related to the interoperability of vocabularies for the enterprise models in different business domains because they are just temporary and distributed organizations across several business boundaries. In order to achieve interoperability regardless of the heterogeneities of business domains, it is needed to define the ontology and semantics with standardized mechanisms. Although the importance of ontology engineering is well understood, it is also known that building a good ontology is a hard task. There are some approaches that present the procedure and the guidelines for ontology development (de Falbo, de Menezes, & da Rocha, 1998). Uschold, King, Moralee, and Zorgios (1997) aim to provide an environment for integrating and capturing key aspects of an enterprise based on ontology. There is another big project for enterprise ontology development: Toronto virtual enterprise (TOVE) project whose goal is to create generic and reusable enterprise ontology (Fox & Gruninger, 1998). The semantic Web movement also discusses the importance of ontology engineering. In order to realize the semantic Web, Berners-Lee defined three distinct levels that incrementally introduce expressive primitives: meta-data layer, schema layer and logical layer (Berners-Lee, 1998). Based on the Berners-Lees levels, Web ontology languages built on uniform resource identifier (URI) and XML (extensible markup language) technology, such as resource description framework (RDF) and RDF schema, are used
for representing information and for the defining semantics of terminology. Recently, Web ontology language (OWL) that is built on top of RDF/RDF schema became a standard recommended by the World Wide Web Consortium (W3C) (W3C, 2004). In this chapter, the ontology engineering is associated with the systematic modeling framework for the agile and interoperable VEs. It offers the basis for the model transformation and the model synchronization in a general open universe of businesses.
Model Transformation
As the model transformation is the process of converting one model to another model, it is of interest for defining synchronization among the models within or across VEs. Therefore, it is undoubtedly considered as a major matter that plays a vital role in our systematic modeling framework for the agile and interoperable VEs. As research area on model transformation is a relatively new area, its taxonomy is defined lately. Some researches have tried to classify and analyze various model transformation techniques in different domains in order to provide an insight into this new area (Czarnecki & Helsen, 2003; Prakash, Srivastava, & Sabharwal, 2006; Sendall & Kozaczynski, 2003). Currently, several researches are performed in the direction of how to express the transformation between models. Gerber, Lawley, Raymond, Steel, and Wood (2002) have indicated that the model transformation is the missing link of MDA. They have tried to express mapping from the enterprise distributed object computing (EDOC) business process model to the breeze workflow model using a number of different model transformation technologies.
69
chitecture (SOA) is the new emerging paradigm for building the agile networks of collaborating business applications distributed within and across business boundaries. As the SOA separates the service interface from the service implementation, it enables service components to be fine-grained and isolated. This separation produces an architecture style that promotes the collaborations among the VE models to be extremely loose and easily reconfigured at the enterprise application level. The SOA serves as glue between well integrated IT systems and well-defined business processes. It encourages the definition and the deployment of the business processes. Although Web service is not the only way to accomplish the SOA, it is usually considered as the ideal candidate for collaboration among the models of the virtual enterprises on the open and loosely coupled platform. The SOA and Web service can bridge the gap between diverse applications and address the increasing need for the agility and interoperability of the VE models. However, current SOA focuses on collaborations at the enterprise application level. As this chapter promotes the concept of the SOA to higher types of VE collaboration, it applies the SOA into the designing of VE architecture, modeling languages, and VE models, as well as the deployment of VE models.
chapter proposes a synthesized architecture and a procedural framework. We combine all relevant technologies into the synthesized architecture. Based on this synthesized architecture, we guide business domain experts and developers through the procedural framework to the entire VE modeling.
Synthesized Architecture
Figure 3 represents diagrammatically the synthesized architecture. First of all, the synthesized architecture is based on EA because EA is usually considered as a systematic approach to configuration and analysis of enterprises or enterprise systems. Our synthesized architecture is based on the original Zachman framework. In our framework, we substitute two dimensions with the perspective layers and the modeling domains, respectively. The shown EA in Figure 3 is just only an example for understanding. It can be extended or modified flexibly according to the characteristics of a VE or the interests of business domain experts. Based on the EA, we combine several technologies such as the MDA, the model transformation, the ontology engineering, and the SOA for the perspective layer integration. Applying the MDA, we regard contextual and conceptual layers as CIM of the MDA. In the same way, we regard logical layer and physical layer as PIM and PSM of the MDA, respectively. In the context of this chapter, these presumptions are sufficient to represent all of the who? (perspective) on VE models. In the relationship between logical layer and physical layer, we apply the model transformation and the ontology engineering in order to transform PIM to PSM. The Web services based on the SOA particularly is applied to PSM of the MDA, because it is considered as a suitable technology on the loosely coupled platform. For the modeling domain integration, we combine the business process-centric architecture
70
( Meta-Meta Model )
M3 Layer
MOF Meta-Meta-Model
UM
DSL DSL UML Meta-Model DSL DSL
e LM
ta
DSL
( Meta Model )
M2 Layer
DSL
DSL
L DI
L D S CI M r fo
CI PI PS M M
M1 Layer ( Model )
PSM
Enterprise Architecture
and the SOA. According to the VE definition, we declare that a VE is made up of value chains with collaborative business processes. In consequence, the process domain is a main interest of the modeling domains and other modeling domains do a role to support the process domain. To realize it, we also apply the SOA, which means the component-based architecture for each modeling domains. In order to support the integration of VE modeling, we combine the meta-modeling approach and the MDAs 4-layer meta-modeling architecture. The componentized CIM, PIM, and PSM at the M1 (model) layer are built in the EA as shown in Figure 3. Above the M1 layer, there is the M2 (meta-model) layer where the modeling languages are defined to describe each model. Above the M2 layer, there is the M3 (meta-metamodel) layer, which is the top layer in the MDA architecture. We introduce the idea of a family of inter-related, but individually specialized,
modeling language which is based on the DSM. In other words, we apply the DSM into the M2 layer in order to freely develop modeling languages, which developers can use easily and accurately in their specific business domains.
Procedural Framework
In order to support the entire VE modeling, our systematic modeling framework is organized as shown in Figure 4. The left side of Figure 4 shows the procedure for the configuration of the VE. It contains four phases focusing on details of the configuration. These phases will be described in detail in the following sections. The right side of Figure 4 briefly shows the facilities supporting each phase. There are several facilities that support each phase. Each modeling facility such as EA designer, DSL/DIL designers, CIM/PIM modelers, and PSM mapper is associated with its relevant reference
Overall Integration
FM MO
Me aet
ta
el od
l de Mo
71
repository, ontology repository, and local instance repository. To increase portability, agility, and interoperability of the models, each modeling facility enables to reuse the best practices stored in each reference repository under the concept of the framework-based development. To support
the communication and the comprehension for retrieval and use, each modeling facility is also connected with the ontology repository. The procedure of the entire VE modeling under the systematic modeling framework is described with IDEF0 model as shown in Figure 5.
EA Design Phase
Local Repository
TOGAF BCF
Defining EA
EA Designer
V E Con figuration
Local Repository
INTERNET
DSL/DIL Designer
Concrete Syntax
Ontology Repository
Local Repository
Deployment Phase
PIM Modeler
Design DsL/DIL A2
DsL/DIL
DsL/DIL
Model cIM/PIM A3
cIM/PIM
cIM/PIM
PIM
Deploy A5
Ontology repository
Distributed repository of reference Model EA Designer DsL/DIL Designer cIM/PIM Modeler PsM Mapper
72
EA Design Phase
First of all, the standardized collaborative models of the VE are established through the EA. It is for that reason that an EA defines all the business components and business processes of a VE and explains how all the enterprise components work together as a whole. It is important that formal EA specification should ideally capture all the aspects that are unique to the enterprise system and also help in making various architecture decisions. The procedure to establish the EA is described as follow: Determining the organizational structure of the VE: The organizational structure of the VE is determined. Assigning the roles of each major partner: The roles are assigned to the selected major partners Decomposing views and perspectives: Because the VE models can be understood in a broad sense, from a number of different
views at different abstract levels, the process of decomposing and separating concerns of various participants is performed. Establishing EA: Through the process of decomposing and separating concerns of various stakeholders, an EA can be built to support these different views and different abstract levels. Fulfilling EA: Once we have established an EA, we begin to collect everything that fulfills it such as business process models, information models, resource models, etc., from the suitable reference repositories.
For EA of VE, we suggest a meta-model of the EA as illustrated in Figure 6. Basically, the EA has several perspective layers and some views. Each EA cell that is produced by a pair of a perspective and a view provides a container of the cell content lists, the modeling language, and the enterprise models. The perspectives correspond to the MDA models and the views correspond to the modeling domains. In addition, Figure 6 also
Figure 6. Meta-model of EA
En terprise Arch itectu re Fram ew ork
Enterprise Architecture
1..*
1..*
Perspective
View
Modeling Language
contents
73
shows how the relevant technologies are reflected in the meta-model of the EA. To define EA for VE, we introduce two assumptions into the EA: One is that each view of the EA corresponds to one modeling domain. The other is that each perspective of the EA refers to the models of MDA such as CIM, PIM, and PSM (Frankel et al., 2003). In the context of this chapter, these assumptions are sufficient to represent all of the who? (perspective) and what? (view) on the VE models.
For example, we can divide the views of the EA into the following 5 modeling domains. 1. 2. Process domain: Focusing on the business processes, which are the core of the EA. Application domain: Focusing on the business applications supporting the business processes. Information domain: Focusing on the business information or system information supporting the business processes and applications respectively. Organization domain: Focusing on the participants responsible for the supporting and execution of the business processes. Technology domain: Focusing on the technology environment and infrastructures supporting the business applications.
3.
4.
5.
Figure 7. EA designer
74
the modeling languages within CIM and PIM of the MDA at the M2 layer. More information about the generation of PSM is described in the deployment phase of Section 4.6. The DSL/DIL design proceeds on a two-step development. The two steps to design DSLs and DILs are briefly summarized as follows: Firstly, DSLs for CIM and DSLs for PIM are designed for each EA cell. Secondly, DSLs for CIM and DSLs for PIM are simply assembled into DIL for CIM and DIL for PIM, respectively. As this DSL/ DIL design phase is based on the meta-modeling approach, each DSL/DIL is developed in the form of UML profile and is composed of abstract syntax, semantics, and concrete syntaxes.
DSL Design
Standing on the basis of the DSM and the metamodeling approach, this session uses the idea of a family of inter-related, but individually specialized, modeling languages, namely DSL. Each narrowly focused DSL can be very effective at describing the VE models in each modeling domain. Therefore, we intend to freely develop the most suitable language and to use it correctly and effectively for the business domain of the VE. As each EA cell has its own DSL, it is natural that DSLs have to be suitable to the contexts of each EA cell and to be inter-related with each other. It has been stated that UML extension mechanism of UML profile is very useful to defining a suite of modeling languages. Thus, DSLs are developed in the form of UML profiles, which is MOF-compliant at M2 layer in Figure 3. To explain the DSL design more easily, the M2 layer of Figure 3 is scaled up in Figure 8, which illustrates some fragments of the example DSL. It shows three EA cells, which are produced by the pairs of logical layer and process domain/information domain/application domain. Based on the characteristics of each EA cell, each DSL is defined with abstract syntax, semantics, and concrete syntaxes.
Figure 7 illustrates the implemented EA designer for this EA design phase. As previously described, EA designer generates 2D-matrix EA in which each EA cell provides a container of the content lists, the DSL/DIL, the reference models and the enterprise models of VE.
75
Enterprise Architecture
Information (Data)
Abstract Syntax Composite Entity Entity Component Abstract Syntax
Process (Function)
Application (Service)
Abstract Syntax Service Collaboration
Business Process Role Entity Data Entity manipulate Entity Role Composite Task Composite Usage Business Process Component offer use Service Component Service Interface Service Role
Perspective Layers
Junction
Service Port
Join
Activity
Activity X O R
ABC
Entity
DIL Design
DSLs are isolated from each other so that each DSL is expressible enough to design the models of corresponding EA cells. However, there is also a need for a coherent modeling language that provides the ability to design and integrate the inter-related models and their relationships across several EA cells. This coherent modeling language can provide insights and enable communication among different stakeholders. As integrating DSLs, DIL are to bridge the gaps between these modeling domains and to integrate the models of the heterogeneous modeling domains. While DSLs are used to design the models that are restricted within each EA cell, DIL is used to design the integrated models that support multiple EA cells throughout CIM
and PIM modeling. Therefore, DSLs provide the easiest and most correct way to establish specific domain models that correspond to requirements of various stakeholders. In addition, the usage of DILs enables different stakeholders to readily understand the enterprise model as a whole. To support it, like the links expressed as dotted bold lines in Figure 8, the related modeling elements among DSLs of different EA cells can be connected. MOF-compliant UML profile of the MDA provides the base to manage different DSLs in an integrated fashion and to knit these isolated DSLs together. DIL is not completely independent of DSL because DIL is a type of meta-model (UML profile) assembling several DSLs. Therefore, the model based on a DSL and the model based on a DIL can be interchanged with and converted to each other easily.
76
The facility, which supports the DSL/DIL design phase is implemented in the previously mentioned EA designer. Figure 9 shows DSL designer of the implemented DSL/DIL designers. The designed elements of DSL such as abstract syntax, concrete syntax, and semantics are packed in the EA cell.
components composing CIM are modeled as PIM at the Logical layer. As the VE is considered as a set of the value chains made up of collaborative business processes, it is natural that the VE can be modeled with the process-centric approach. A generalized and process-centric representation for business partners was presented and implemented in our previous research (Kim, Son, Kim, Kim, & Baik, 2005; Kim, Kim, Lee, & Kim, 2005). As this CIM/PIM modeling phase is based on the modeling philosophy of our previous research, CIM and PIM for the VE are regarded as the business scenarios and the collaborative business processes, respectively, as illustrated in Figure 10. In CIM modeling for the business scenarios, functional areas and organizations of each business partner are determined using the functionorganization matrix that describes the process stream and organization stream of the VE. With respect to the process stream, the units of enterprise activities are logically and temporally ordered to
77
Organization Stream
In PIM modeling for the collaborative business processes, we recommend to perform a top-down analysis primarily to show the business processes according to the business scenario. These business processes, as well as other business components and their relationships, are systematically modeled through the DSL and DIL for PIM.
CI M Modeling
Coherent Modeling
Specifically, our systematic modeling framework supports the coherent modeling using DIL in the PIM modeling phase. The usage of DILs enables developers to readily understand the VE models as a whole. DIL is used to integrate the domain models of the specific view into the entire model of the integrated view, so that each stakeholder can verify their own domain model from the entire model through view navigation. The integrated view using DIL is useful when different stakeP IM Modeling
realize products. For the organization stream, the organization, human, and technical resources are systematically and repetitively assigned.
Design Details
Product Spec. Concept Drawing Major Component Detailed Drawing BOM Sourcing List Cost Engineering Design Manager System Engineer Manufacturing Engineer Financing Engineer
A N D
Investigate Technology
Product Spec. Concept Drawing Available Tech .
Technology Portal
refer
Item
Design Subsystems
Design Details
PDM Service
Option 0..N
Investigate Technology
Authoring Service
refer
refer
78
holders design an integrated model and evaluate the relationships among the individual domain models and integrated models. An example of the coherent modeling is represented in Figure 11. The facility, which supports the CIM/PIM modeling phase is also implemented in the previously mentioned EA designer. Figure 12 shows the implemented CIM/PIM modelers. The implemented CIM/PIM modelers also provides the coherent modeling functionality in order to design and integrate the inter-related models and their relationships across several EA cells. The designed VE models such as CIM and PIM are packed in the EA cell.
Deployment Phase
In this deployment phase, the designed VE models are deployed into PSM for actual execution so as to be suitable for specific technology platform. In order to deploy the designed VE models into PSMs, the model transformation through Figure 12. CIM/PIM modelers
meta-model mapping can be introduced. It is obvious that business domain experts can not define DSL/DIL, which provides the executable ability in the DSL/DIL design phase. Thus, it is better to transform the VE models to the execution models through the model transformation. As briefly shown in Figure 13, a meta-model of PSM, that is Web service language, is developed as a UML profile. And then, it is mapped from the DSL/DIL. Such meta-model mapping at the M2 layer enables to transform the CIM/PIM into PSM, namely Web service models. In this chapter, Web service is considered to be the best solution for PSM. Web service is a way to implement the SOA, which is intended to enable developers to create the service components that can be assembled and deployed in a distributed environment. Therefore, Web service is a useful candidate for integrating the enterprise application and setting up the open and loosely coupled information platform for the VE.
79
aet LM UM
U M L P r ofile for C IM
DIL (UML Profile) for CIM DSL DSL DSL DSL DIL for PIM
U M L P r ofile for P IM
DSL
DSL
DSL
M2 Layer
DSL L DS L DI
DI
L DS CIM or Lf
CI PI M
M1 Layer ( Model )
PS
eL tiv ec rs p Pe
e rs ay
Contextual
Conceptual
Logical
Physical
Enterprise Architecture
M eta-m odel M apping (M odel Transform atio n)
Modeling Domains
Entity Data
Entity
Service Role
Partner
Process
Variable
M2 Layer (Meta-Model)
Service Component
Service Interface
Composite Task
Composite Usage
Junction
Activity
Operation
Split
Join
Composite Service
Simple Service
Invoke
Receive
Reply
Port Type
<process name="DesignNewProduct_Process" Detailed Drawing targetNamespace="http://ooo.ooo.ooo/dp" xmlns="http://schemas.xmlsoap.org/ws/2003/03/business-process/" BOM Design Design xmlns:msg="http://ooo.ooo.ooo/dp/msg" Subsystems Details Sourcing List xmlns:sc="http://ooo.ooo.ooo/dp/sc"> Product Spec. Subsystems Detailed Drawing Product Spec.
Concept Drawing Layout Drawing Concept Drawing BOM
Layout Drawing
Project Scheduler
Cost
A N D
Investigate Technology
Product Spec. Concept Drawing Available Tech.
<partnerLinks> Major Component Sourcing List Major Component F/A Result F/A name="DesignNewProduct _Service" partnerLinkType="sc:DesignNewProduct_PLT" myRole="DesignNewProduct_Role"> Cost <partnerLink Result <partnerLink name="ProjectScheduler_Service" partnerLinkType="sc:ProjectScheduler_PLT" partnerRole="PrepareProductRoadmap_Role"> Engineering Engineering CAD Design Design <partnerLink name="TechnologyPotal _Service" partnerLinkType="sc:TechnologyPotal_PLT" partnerRole="InvestigateTechnology_Role"> System Manager Manager <partnerLink name="PDM_Service" partnerLinkType="sc:PDM_PLT" partnerRole="DesignSubsystem_Role"> System System Engineer Engineer <partnerLink name="CAD_Service" partnerLinkType="sc:CAD_PLT" partnerRole="DesignDetails_Role"> Manufacturing Manufacturing </partnerLinks> Engineer Engineer
Financing
Technology Portal
M1 Layer (Model)
Engineer <variables> <variable name="ProductSpec" messageType ="msg:ProductSpec"/> <variable name="ConceptDrawing" messageType="msg:ConceptDrawing"/> <variable name="RoadMap" messageType="msg:RoadMap"/> <variable name="AvailableTech" messageType="msg:AvailableTech"/> <variable name="Subsystems" messageType="msg:Subsystems"/> <variable name="LayoutDrawing" messageType ="msg:LayoutDrawing"/> R&D <variable name="MajorComponent" messageType ="msg:MajorComponent"/> Team <variable name="F/AResult" messageType ="msg:F/AResult"/> <variable name="DetailedDrawing" messageType="msg: DetailedDrawing"/> <variable name="BOM" messageType="msg:BOM"/> <variable name="SourceList" messageType ="msg:SourceList"/> <variable name="Cost" messageType ="msg:Cost"/> <variables>
<sequence> <receive name="DesignNewProduct " partnerlink="DesignNewProduct _Service" portType="DesignNewProduct_PT" operation="Do_DesignNewProduct" variable="ProductSpec" variable="ConceptDrawing"/> <flow> <invoke name="PrepareProductRoadmap" partnerlink="ProjectScheduler_Service" portType="sc:ProjectScheduler_PT" operation="Do_PrepareProductRoadmap" inputVariable="ProductSpec" outputVariable="RoadMap"> <invoke name="InvestigateTechnology" partnerlink="TechnologyPotal_Service" portType="sc:TechnologyPotal_PT" operation="Do_InvestigateTechnology" inputVariable="ProductSpec" inputVariable="ConceptDrawing" outputVariable="AvailableTech"> </flow> <invoke name="DesignSubsystems" partnerlink="PDM_Service" portType="sc:PDM_PT" operation="Do_DesignSubsystems" inputVariable="ProductSpec" inputVariable="ConceptDrawing" inputVariable="AvailableTech" inputVariable="RoadMap" ouputVariable="Subsystems" ouputVariable="LayoutDrawing" ouputVariable="MajorComponent" ouputVariable="F/AResult"> <invoke name="DesignDetails" partnerlink="CAD_Service" portType="sc:CAD_PT" operation="Do_DesignDetails" inputVariable="ProductSpec" inputVariable="ConceptDrawing" inputVariable="MajorComponent" ouputVariable="DetailedDrawing" ouputVariable="BOM" ouputVariable="SourceList" ouputVariable="Cost"> <reply name="DesignNewProduct " partnerlink="DesignNewProduct_Service" portType="DesignNewProduct-PT" operation="Do_DesignNewProduct " variable="Subsystems" variable="LayoutDrawing" variable="DetailedDrawing" variable="BOM" variable="SourcingList" variable="Cost" variable="F/AResult"/> </sequence> </process>
80
As represented diagrammatically in Figure 14, PIM, which are modeled in Figure 11, can be transformed into BPEL4WS model via the meta-model mapping between DSL/DIL into the meta-model of BPEL4WS. And the generated BPEL4WS model is expected to be possibly executed through the existing commercial Web server systems, such as WebSphere or WebLogic.
synthesized architecture, which combines all relevant technologies. Based on the synthesized architecture, we also propose the procedural framework, which guides the enterprise configuration to support the entire VE. The proposed systematic modeling framework could be used by business domain experts and developers to build an agile and interoperable VE quickly and systematically by composing business partners and by designing the collaborative business processes and the business components across the value chains of the VE. For communications among the different stakeholders, it also supports the coherent enterprise modeling in which various stakeholders, having their own aspects and methodology, such as an IT manager and a business manager, can communicate effectively. Consequently, this systematic modeling framework could contribute significantly to the configuration of agile and interoperable VEs. Although the modeling framework is developed in this chapter, works are currently underway to enrich it as yet. The in-depth meta-models for specific business domains have not been covered in this chapter because they are too complicated to be described in detail. Through gathering industrial data and cases, the meta-models, which are applicable to real industrial example, should be constructed and proved by experiments. We have implemented a modeling system supporting the proposed modeling framework. Nevertheless, because there is much room for improvement as ever, we are under discussion on better and more robust system implementations.
rEFErENcEs
Andrews, T., Curbera, F., Dholakia, H., Goland, Y., Klein, J., Leymann, F., et al. (2003). Business process execution language for web services version 1.1. Retrieved from http://www-106.ibm.com/ developerworks/Webservices/library/ws-bpel/
81
Ang, C. L., Khoo, L. P., & Gay, R. K. L. (1999). IDEF*: A comprehensive modeling methodology for development of manufacturing enterprise system. International Journal of Production Research, 37(17), 3839-3858. Arkin, A. (2002). Business process modeling language. Retrieved from http://www.bpmi. org/downloads/BPML1.0.zip Barnett, W., Presley, M. J., & Liles, D. (1994). An architecture for the virtual enterprise. Paper presented at the IEEE International Conference on Systems, Man, and Cybernetics, San Antonio. Berners-Lee, T. (1998). Semantic Web road map. Retrieved from http://w3.org/DisignIssues/Semantic.html Booch, G., Rumbaugh, J., & Jacobson, I. (1999). The unified modeling language user guide. Addison-Wesley. Business Process Management Initiative. (2003). Business process modeling natation working draft 1.0. Retrieved from http://www.bpmi.org/downloads/BPMN-V1.0.pdf Cadence Design Systems. (2003). Design chain optimization: Competing in the disaggregated electronic industry. Cadence Design Systems, Whitepaper. Camarinha-Matos, L. M., & Afsarmanesh, H. (2003). Elements of a base VE infrastructure. Computers in Industry, 51, 139-163 CIO Council. (2001). A practical guide to federal enterprise architecture version 1.0. Retrieved from http://www.cio.gov CSC. (2002). The emergence of business process management version 1.0. A Report by CSCs Research Services Czarnecki, K., & Helsen, S. (2003). Classification of model transformation approaches. Paper presented at the OOPSLA03 Workshop on
Generative Techniques in the Context of ModelDriven Architecture. Retrieved from http://www. softmetaware.com/oopsla2003/mda-workshop. html DoDAF Working Group. (2003). DoD architecture framework version 1.0: Volume I: Definition and guidelines. de Falbo, R. A., de Menezes, C. S., & da Rocha, A. R. C. (1998). A systematic approach for building ontologies. IBERAMIA98, LNAI 1484. Fox, M. S., & Gruninger, M. (1998). Enterprise modeling. AI Magazine, American Association for Artificial Intelligence Press. Frankel, D. S., et al. (2003). The Zachman framework and the OMGs model driven architecture. Business process Trends: Whitepaper. Frankel, D. S. (2004). Domain-specific modeling and model driven architecture. Business Process Trends: MDA Journal. Gerber, A., Lawley, M., Raymond, K., Steel, J., & Wood, A. (2002). Transformation: The missing link of MDA. In Proceedings of International Conference on Graph Transformation (ICGT), Barcelona, Spain. Gou, H., Huang, B., Liu, W., & Li, X. (2003). A framework for virtual enterprise operation management. Computers in Industry, 50, 333-352 Harmon, P. (2003a). Second generation business process methodologies. Business Process Trends: Newsletter, 1(5). Harmon, P. (2003b). Developing an enterprise architecture. Business process Trends: Whitepaper. IFIP-IFAC Task Force. (1999). GERAM: Generalised enterprise reference architecture and methodology version 1.6.3. Retrieved from http:// www.cit.gu.edu.au/~bernus/taskforce/geram/versions/geram1-6-3/GERAMv1.6.3.pdf
82
The Instrumentation, Systems, and Automation Society. (2004). Enterprise-control system integrationPart 3: Models of manufacturing operations management, ISA Draft 95.00.03. Jagdev, H. S., & Thoben, K. D. (2001). Anatomy of enterprise collaborations. Production Planning & Control, 12(5), 437-451 Kim, C. H., Son, Y. J., Kim, T. Y., Kim, K., & Baik, K. (2005). A modeling approach for designing a value chain of virtual enterprise. International Journal of Advanced Manufacturing Technology. Online first retrieved http://dx.doi.org/10.1007/ s00170-004-2445-4 Kim, T. Y., Kim, C. H., Lee, J. S., & Kim, K. (2005). Enterprise architecture framework based on MDA to support virtual enterprise modeling. In Proceedings of the 9th International IEEE EDOC Workshop on VORTE (Vocabularies, Ontologies, and Rules for The Enterprise), Enschede, Netherlands. MetaCase. (2005). Domain-specific modelling, application development advisor. Retrieved from http://www.appdevadvisor.co.uk/express/vendor/ domain.html Miller, J., & Mukerji, J. (2003). MDA guide version 1.0.1. Retrieved from http://www.omg. org/docs/omg/03-06-01.pdf NIIIP. Retrieved from http://www.niiip.org Object Management Group. (2002). Model driven architecture (MDA). Retrieved from http://www. omg.org/mda/ Object Management Group. (2003a). Request for proposal: business process definition metamodel RFP. Retrieved from http://www.omg.org/docs/ bei/03-01-06.pdf Object Management Group. (2003b). UML 2.0 infrastructure specification: Final adopted specification. Retrieved from http://www.omg. org/docs/ptc/03-09-15.pdf
Object Management Group. (2003c). UML 2.0 superstructure specification: Final adopted specification. Retrieved from http://www.omg. org/docs/ptc/03-08-02.pdf Object Management Group. (2004). UML profile for enterprise collaboration architecture specification version 1.0. Retrieved from http://www. omg.org/docs/formal/04-02-05.pdf Prakash, N., Srivastava, S., & Sabharwal, S. (2006). The classification framework for model transformation. Journal of Computer Science, 2(2), 166-170. Supply Chain Council. (2003). Supply chain operations reference modelSCOR version 6.0. Supply Chain Council, Inc. Sendall, S., & Kozaczynski, W. (2003). Model transformation: The heart and soul of model-driven software development. IEEE Software, Special Issue on Model Driven Software Development, Sep./Oct. Smith, H., & Fingar, P. (2003). Business process management: The third wave. Meghan-Kiffer Press. TeleManagement Forum. (2002). Enhanced telecom operations MapTM (eTOM): The business process framework version 3.0, GB921. Uschold, M., King, M., Moralee, S., & Zorgios, Y. (1997). The enterprise ontology. Knowledge Engineering Review, 13. Vernadat, F. B. (1993). CIMOSA: Enterprise modeling and enterprise integration using a process-based approach. Paper presented at the Workshop on the Design of Information Infrastructure Systems for Manufacturing, The Japan Society for Precision Engineering. Vernadat, F. B. (1996). Enterprise modeling and integration: Principles and applications. Chapman and Hall.
83
Vesterager, J., Tolle, M., & Bernus, P. (2002). VERA: Virtual enterprise reference architecture. Paper presented at the Blobeman Plenary Conference, Helsinki. W3C. (2001). Web services description language (WSDL) 1.1, W3C Notes. Retrieved from http:// www.w3.org/TR/wsdl/ W3C. (2004). OWL Web ontology language guide, W3C Recommendation. Retrieved from http://www.w3.org/TR/owl-guide/ Williams, T. J. (1993). The Perdue enterprise reference architecture. Paper presented at
the Workshop on the Design of Information Infrastructure Systems for Manufacturing, The Japan Society for Precision Engineering. Zachman, J. A. (1987). A framework for information systems architecture. IBM Systems Journal, 26(3). Zarli, A., & Richaud, O. (1999). Requirements and technology integration for IT-based businessoriented frameworks in building and construction. Electronic Journal of Information Technology in Construction, 4. ZIFA. Retrieved from http://www.zifa.com
84
85
Chapter V
AbstrAct
This chapter describes the activity-based methodology (ABM), an efficient and effective approach toward development and analysis of DoD integrated architectures that will enable them to align with and fully support decision-making processes and mission outcomes. ABM consists of a tool-independent disciplined approach to developing fully integrated, unambiguous, and consistent DODAF Operational, System, and Technical views in supporting both as-is architectures (where all current elements are known) and to-be architectures (where not all future elements are known). ABM enables architects to concentrate on the Art and Science of architecturesthat is identifying core architecture elements, their views, how they are related together, and the resulting analysis used for decision-making purposes. ABM delivers significant architecture development productivity and quality gains by generating several DoDAF products and their elements from the core architecture elements. ABM facilitates the transition from integrated static architectures to executable dynamic process models for time-dependent assessments of complex operations and resource usage. Workflow steps for creating integrated architecture are detailed. Numerous architecture analysis strategies are presented that show the value of integrated architectures to decision makers and mission outcomes.
IntroductIon
This document provides guidance in developing fully integrated, unambiguous, and consistent DoD architecture framework (DoDAF) and ar-
chitecture descriptions in supporting both as-is domains (where all current elements are known) and to-be domains (where not all future elements are known). It presents a disciplined approach in identifying core architecture data elements, their
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
views, how they are related together, and how they compare with other architectures developed according to this guidance. The resulting analysis based on common, integrated architecture data can then be used for decision-making purposes. The associations between these core elements form the basis of an integrated architecture data model. Using these core architecture data elements and their associations, significant architecture development productivity and quality gains can be obtained by providing a standard means for comparing and relating architecture descriptions. Workflow steps in creating an integrated architecture are detailed. Architectures are a means to an end and not an end to themselves. They need to be aligned with and support the decision-making process and ultimately mission outcomes and objectives. Figure 1 depicts this process where mission outcomes are determined by mission decisions, chosen from among a set of courses of actions, based on analysis and assessments of architecture
data, coming from both integrated and executable architectures. Having a disciplined process that ensures quality architectures raises the potential for quality and consistency in their descriptions and minimizes discrepancies. Consequently, the analytics will produce quality results, not be prone to misinterpretations, and thus, be of high value to decision makers and mission outcomes.
bAckground
The DoD architecture framework (DoDAF) provides DoD commands, services, and agencies with the rules and guidance for describing architectures for both warfighting operations and business processes (DoDAF, 2003). DoDAFs purpose is to ensure that the architecture descriptions contain related architecture entities and relationships that can be used (1) for understanding, comparing, and integrating families of systems (FOSs) and systems of systems (SoSs) and (2) to enable in-
86
teroperating and interacting architectures within and across organizational boundaries, including joint and multi-national. DoDAF is not an architecture by itself. DoDAF is an architecture framework that provides structured guidance and rules for classifying and organizing architectures within an enterprise. It represents approaches, standards, concepts, descriptions, views, visualizations, products, and architecture artifacts in a single framework. An architecture is a representation of a defined domain as of a current or future point in time. The term is generally used both to refer to an architecture description and an architecture implementation. In this document, the term architecture will be used as a shortened reference to architecture description. An architecture description, then, is a representation of a defined domain as of a current or future point in time, in terms of its component parts, what those parts do, how the parts relate to each other, and the rules and constraints under which the parts function. What constitutes domains and components depends on the degree of detail of interest. For example, domains can be at any level, from DoD as a whole down to individual functional areas
or groups of functional areas. Component parts can be anything from U.S. Air Force as a component of DoD, down to a satellite ground station as a component part of a communications network, or a UAV operator as a component part of a reconnaissance system. What those parts do can be as general as their high-level operational concept or as specific as the lowest-level action they perform. How the parts relate to each other can be as general as how organizations fit into a very high-level command structure or as specific as what frequency one unit uses in communicating with another. The rules and constraints under which they work can be as general as high-level doctrine or as specific as the e-mail standard they must use. An architecture description can represent requirements without a specific implementation or it can represent both requirements and their implementation. An architecture description consists of integrated architecture perspectives (or views). Architecture descriptions and views help communicate domain complexity and aid in its understanding. Architecture perspectives are logical perspectives used to separate components into unique viewpoints or frames of reference. Each architecture view, by itself, consists of one or more related real-world models (or products) of processes, resources, rules, and relationships for a specific viewpoint. These products are graphical, textual, or tabular related representations of architecture artifacts (elements). At the lowest level, architecture artifacts are instances of activities, nodes, organizational elements, organizations, systems, networks, interfaces, etc.
87
scription of an enterprises operational elements required to accomplish DoD missions. SV is a refinement of the OV that describes system elements, their functions and interfaces, and their exchanges supporting operational missions. TSV is the set of standards to be applied to the elements and their relationships in the OV and SV. A fourth view, All-Views (AV), relates overarching aspects of OV, SV, and TSV. AV products provide information pertinent to the entire architecture but do not represent a distinct view of the architecture. AV products set the scope and context of the architecture to include (i) subject area and timeframe for the architecture, (ii) setting in which the architecture exists, (iii) interrelated conditions such as doctrine, tactics, techniques, and procedures that compose the context for the
architecture, (iv) relevant goals and vision statements, (v) concepts of operations, scenarios, and environmental conditions. Each view is composed of sets of architecture elements that are depicted via a baseline set of 26 graphic, tabular, and textual architecture products. It is important to distinguish between an architecture view and an architecture product. As stated earlier, an architecture view represents a given perspective of an architecture, while an architecture product is a specific representation of a particular aspect of that perspective. At the lowest level, these architecture artifacts are data instances of activities, nodes, organizational elements, organizations, systems, networks, interfaces, etc.
t ts en m m r re ui e eq y y ll R es o og ie o ol na illit h hn y iio b at pa ec llit l ra ap Te bii iica pe d C rta hn O d sic por ch s an Ba upp Te iitie Su ew abil b N p N p Ca
systems view
relates systems and characteristics to operational needs
Technical Standards Criteria Governing Interoperable Implementation/Procurement of the Selected System Capabilities
88
89
Is unambiguous and semantically rich: eliminate semantic overloading of architecture data elements. Identifies a set of core architecture elements. Ensures DoDAF architectures do not become dis-integrated. Supports executable architecture development and analysis. Enables linking (federating) producing and consuming architectures. Captures sufficient architectural detail for full DOTMLPF analysis (not just material).
Is unambiguous and semantically rich: eliminate semantic overloading of Architecture data elements
Semantic overloading is where one descriptive element conveys more than one semantic concept. This results in definitions of architecture elements
90
being subject-to-differing-interpretations by architects and creates ambiguity that may or may not be resolved through examination, on an individual basis, of the context in which the element is used. It is primarily DoDAFs inconsistent expression of semantics that characterizes it as semantically incomplete. Most notably, an Operational Node is defined (and has been since the original 1997 C4ISR Framework (C4ISR AF, 1997, pp. 4-11)) to be an element that represents Organizations, Organization Types, and Occupational Specialties (DoDAF, Vol II, pp. 3-10), while at the same time is defined to be an element that produces, consumes, or processes information (DoDAF, Vol II, pp. 4-7). Operational nodes have also been increasingly interpreted as platforms (ground, air, and sea), facilities, and systems in many OV architectures. Thus, what constitutes an operational node can vary among architectures, including, but not limited to, an operational/human role, an organization, organization type, and so on. Another example is the semantic overloading of the Operational View (OV). Current OV describes both (1) a human performer-only view and (2) an undifferentiated logical view that treats performers as neither human nor machine, but instead as resources composed of both. Again, only by examining the context of each OV can one resolve the intention of the architecture. To eliminate any ambiguity and semantic overloading, an architecture taxonomy, at the highest level, must be based on the six interrogativeswhO, where, whAT, why, wheN, and hOw. This eliminates the case where whO and where are combined into a single element (Operational Node).
set of architecture elements and their respective framework products that are the sources of those elements, integrated architectures may not always be produced. For example, while an OV-3 is part of the integrated product set, some architectures that only consist of an OV-3 are declared to be integrated without one ever producing an OV-2 or OV-5. A set of four core architecture elements from the six interrogativesnodes (where), resources (whO), products (whAT), functions (hOw) serve as the foundation of an integrated architecture.
91
standard workflow procedure is that two exchange products, OV-3 and SV-6, can automatically be generated from their constituent core elements as defined in their respective framework products (OV-2, OV-5, SV-1, and SV-4). This eliminates any manual synchronization by architects and improves and accelerates the entire development process.
92
IntegrAted ArchItectures
Before one can use architecture descriptions for any analysis, decision-making, and mission outcome purposes, one must first start with an architecture that is integrated, unambiguous, and consistent. There are two definitions of an integrated architecture. The first comes from DoDAF and is considered as a top down product perspective. The second is described by ABM here and is considered as a bottom up data perspective. For both definitions, integrated architectures facilitate integration and promote interoperability across family-of-systems and system-of-systems and compatibility among related mission area architectures. From a top down product perspective, DoDAF defines a single architecture description to be an integrated architecture when products and their constituent architecture data elements are developed such that architecture data elements defined in one view are the same (i.e., same names, definitions, and values) as architecture data elements referenced in another view. A subset of DoDAF products make up the foundation of an integrated architecture and consists of AV-1, AV-2, OV-2, OV-3, OV-5, SV-1, and TV-1 at a minimum (DoDAF, Vol I, p. 1-5). From a bottom up data perspective, ABM defines an integrated architecture description to be when architecture data elements are defined based on a methodology-independent, semantically complete model of the concepts used in understanding and describing integrated architectures. Integrated architectures usually have associated with them a time frame, whether by specific years (e.g., 2005-2010) or by designations such as as-is, to-be, transitional, objective, epoch, etc. In all cases, this reduces to either inventories of current capability (as-is) or blueprints of future capability (to-be). Domain experts, program managers, and decision-makers need to be able to analyze these architectures to locate, identify, and resolve definitions, properties, facts,
constraints, inferences, and issues both within and across architectural boundaries that are redundant, conflicting, missing, and/or obsolete. The analysis must also be able to determine the effect and impact of change (what if) when something is redefined, redeployed, deleted, moved, delayed, accelerated, or defunded. In most as-is architectures, details about architecture elements are fully known and architectures analysis can be readily accomplished. The present DoDAF approach to developing to-be integrated architectures and their analysis does not fully enable them to be used for true system engineering purposes to discover future enterprise rules, patterns, practices, relationships, and system and organizational requirements. That is because not all architecture details are known resulting in architecture descriptions that are based on unknowns and abstract elements. However, with ABM and by examining aggregations and clusters of architecture elements and by performing gap analysis and assessments, new system and organizational requirements can be derived. This would support justifications for future funding decisions of new systems, their elements, components, and supporting operational organizations. It is assumed that any architecture project begins with an effort to identify the architectures intended purpose, its scope, and level of detail that follows the six-step process detailed in (DoDAF Vol. I, pp. 5-4).
ActIvIty-bAsed methodoLogy
ABM presents a holistic approach for architecture development (Ring, Nicholson, Thilenius, & Harris, 2005). It establishes a common means to express integrated architecture data consistent with intent of DoDAF, JCIDS, ITPM, and the Clinger-Cohen Act (CCA, 1996). ABM provides a rigorous, disciplined, and structured approach to integrated architecture development and
93
analysis that is lacking today. It consists of a tool-independent methodology that enables fully integrated, unambiguous, and consistent DODAF views to be developed in supporting both as-is architectures and their analysis as well as to-be architecture and their analysis to include future gap-analysis. The Zachman framework (Zachman, 1987) describes a structure for defining and capturing architecture descriptions. It is arranged as a matrix where the columns represent six logical interrogative abstractions or aspectswhAT (Product), hOw (Function), whERE (Node), whO (Resourse), whEN (Event), why (Rule)and the rows represent unique viewpoint perspectives
or frames of reference (ORourke, Fishman, & Selkow, 2003). ABM architecture descriptions are based on this Zachman framework matrix with the six columns representing architecture elements and three architecture view row perspectives representing the three DoDAF viewsOV, SV, and TSV. Grouping of architecture elements into the six interrogatives ensures consistency in their meaning and eliminates any possible conflicting and/or misinterpretation of their definitions. Figure 4 illustrates DoDAF with ABM based on this matrix. ABM does not impact the DoDAF All View (AV) or Technical Standards View (TSV). However, the Operational View (OV) and System
94
View (SV) are directly impacted. ABM uses a data centric approach that supports cross-product relationships based on an integrated symmetric set of architecture building block elements. These enable several architecture elements and architecture products to be automatically generated. An integrated architecture, based on ABM, is built on a foundation of five pillars (Figure 5): 1. 2. 3. 4. 5. Separation of architecture elements into six interrogative groupings. Symmetric alignment of architecture elements. Four core architecture elements. Data-centric architecture data model. Generation of DoDAF elements and products.
Figure 8 shows how DoDAF associates its constituent architecture elements to each of the six interrogatives within the three DoDAF perspective views (Operational, System, Technical).
95
On the Operational View side, concept of operations (CONOPS), information, activities, nodes, roles, and processes represent the primary architecture objects. Need lines represent associations between information, activities and node entities with the information exchange providing the attributes of need lines. Roles have relationships with each other (e.g., supervisor, command, and coordinate), which are modeled as organizations and they possess knowledge, skills, and abilities (KSA) attributes. Similar associations and relations exist on the System View side.
96
2.
3.
dynamic time and costs properties needed in an executable architecture. ReSouRce (who: role, system): Means by which a FUNCTION is performed, processed, or executed. Roles are human resources, characterized by a set of knowledge, skills and abilities (KSA) assigned to humans and are analogous to job titles or job responsibilities. Systems are machine resources and are described in terms of their performance characteristics. Roles and systems can be structurally composed into organizations and networks. They each carry dynamic time and costs properties needed in an executable architecture. PRoDuct (what: information, data): Formalized representations of data subject to a transformation process. They are the inputs and outputs of FUNCTIONS. PRODUCTS can be decomposed into their component items so that, at higher levels of a FUNCTION model, an input/output can be considered as a bundle while at
4.
the lower levels the input/outputs consists of the unbundled component items. For example, weather could be made up of temperature and humidity so that weather is produced/consumed at the higher FUNCTION levels but temperature and humidity are separate inputs and outputs at the lower FUNCTION levels. Bundled information is usually graphically depicted as branchs/joins. PRODUCTS do not have time propertiestheir exchanges do. NoDe (wheRe: operational node, system node): Logical or functional encapsulations (i.e., groupings or collections) of (1) RESOURCES (if known) performing FUNCTIONS and (2) FUNCTIONS alone when RESOURCES are unknown (see Figure 10). NODES are usually where RESOURCES are located in performing FUNCTIONS. NODES can be decomposed to sub-NODES. They carry no dynamic time properties but carry cost properties.
97
Since NODES are considered as encapsulations or collections, they may be graphically depicted as platforms (ground, air, and sea), organizations, facilities, tactical operational centers (TOC), air and space operations center (ASOC), vans, military units, buildings, and even soldiers. Figure 11 shows these graphical depictions of collections of RESOURCES performing FUNCTIONS (i.e., NODES). For any instance thats considered a NODE (operational, system), the same instance can also be considered a RESOURCE (role, system) at the same time and vice versa. Because of the separation of NODES and RESOURCES in ABM, one can have the same textual representation for bothonce for a NODE (operational, system) and once for a RESOURCE (role, system). Having the same textual representation for both NODE and RESOURCE has no impact because they separately exist. Note that a NODE could also have been considered an organization and an organization also considered as a NODE. Again, with the separation in ABM, one can have the same textual representation for both concepts in the same architecture. This separation eliminates any semantic overloading of the NODE definition.
For example, lets say an architect views a military unit organization as a role and creates the 1-8 Armor Battalion role. If in the same architecture, the same military unit organization is considered as a node, then the architect creates the 1-8 Armor Battalion node. Because of the separation of the two node and role definitions in ABM, information exchanges and need lines will be consistent. That is, some activity is performed by the 1-8 Armor Battalion role at the 1-8 Armor Battalion node. In addition, when the OV-2 node diagram is viewed, the architecture will see the 1-8 Armor Battalion as a node item which is entirely consistent with the architects view of the architecture. Similarly, when the OV-4 organization diagram is viewed, the architect will see the 1-8 Armor Battalion as a role itemagain entirely consistent with architects view of the architecture. In all cases, the consistency of the three-way association between NODE, FUNCTION, and RESOURCE is always maintained allowing complete flexibility in creating architectures. The benefit to the architect is that the architecture diagrams and models are consistent with
98
the manner in which they are defined, viewed, and intended. The core elements relate to each other such that: Each (activity, system function) that produces and consumes (information, data) is performed at an (operational node, system node) by a (role, system) Each (operational node, system node) contains a (role, system) that performs an (activity, system function) that produces and consumes (information, data) Each (role, system) in an (operational node, system node) performs an (activity, system function) that produces and consumes (information, data) (information, data) is produced from and consumed by an (activity, system function)
performed by (role, system) at a (operational node, system node) This is the foundation for the dual set of three-way relationships as shown in Figure 12. The intersection of the association between an activity and a node is a role and, likewise, the intersection of the association between a system function and a system node is a system. Figure 13 shows how the three-way associations can be visualized by having each FuncTion, nodE, and rEsourcE core element graphic object display its respective associations with the other two core elements.
99
products. Because of the symmetrically aligned set of architecture elements shown in Figure 9, ABM addedOV-4 (roles), OV-7 (information), SV-2 (Networks), SV-4 (system Functions), SV-5, and SV-11 (Data)to the original seven DoDAF integrated product set (AV-1, AV-2, etc.). SV-5, in particular, maps activities to system functions enabling integrated Operational and System views within a single architecture. The four core elements come together to form information exchanges and system data exchanges from which need lines and interfaces are extracted. The source DoDAF products for the core elements are summarized in Table 4. Figure 15 depicts the top-level ABM architecture data model. As important as it is to understand the direct relationships that exist between the architecture
data elements, it is equally important to understand the direct relationships that do not exist. For example, systems are not directly related to activities. They are related, indirectly (via SV-5), first to system functions and then from system functions to activities.
100
artifacts that can be repeatedly regenerated as the architecture evolves and matures. To enable valid generation of these elements and products, ABM introduces external FUNCTIONS as high level context FUNCTIONS in the FUNCTION model. They are perfomed by external RESOURCES at external NODES in producing and consuming PRODUCTS (information, data) to/from the highest level context FUNCTION. External FUNCTIONS, External RESOURCES, and External NODES are all considered outside the scope of the context FUNCTION model. They provide producing and consuming ending FUNCTIONS when generating operational/ system exchanges between themselves and leaf FUNCTIONS. Figure 16 shows an Operational View example where two external activities are each associated with their own external nodes and external roles in providing the source of an input and the destination of an output into and out of the context activity. Defining external (producing and consuming) elements enables ABM-based integrated architectures to be federated together. This is because the consuming external elements of one architecture are the producing external elements of a second federated architecture. Conversly, the producing external elements of one architectuere are the consuming external elements of a second federated architecture.
Need lines (Operational) and interfaces (System) document the requirement to exchange (1) PRODUCTS between NODES and (2) PRODUCTS between RESOURCES. Exchanges identify who exchanges what products, with whom, why the information is necessary, and how the information exchange must occur. Exchanges and their need lines/interfaces are generated from their four producing and consuming core elementsleaf FUNCTIONS (including external activities), their input and output PRODUCTS (information, data), and their associations to NODES (including external nodes) and to RESOURCES (including external roles and systems). FUNCTION models are decomposed down to the appropriate level for the purposes of the architecture. Leaf FUNCTIONS are at the lowest decomposition level. Usually, this would be to the level where a FUNCTION is capable of being (i) associated with a single NODE and/or (ii) assigned to an individual RESOURCE, and/or (iii) has a single input or single output PRODUCT. Usually leaf FUNCTIONS are some combination of these three and subject to judgment calls by the architect. Figure 17 graphically illustrates how NODE need lines/interfaces (between two NODES) contain collections of RESOURCE need lines/ interfaces (between two RESOURCES within each NODE) which, in turn, contain the entire
101
collection of the individual exchanges (between two functions performed by the two RESOURCES at the two NODES). Need lines/interfaces can be alternatively be visualized (Figure 18) where a single NODE need line/interface pipeline consists of one or more RESOURCE need line/interface pipelines each consisting of one or more exchanges. OV-3 information exchanges and OV-2 need lines are generated from their four producing and consuming core elementsleaf activities, their information inputs and outputs, and their associations to nodes and to roles as shown in Figure 19.
Likewise, the SV-6 system data exchanges and SV-1 interfaces are generated from their four producing and consuming core elementsleaf system functions, their data inputs and outputs, and their associations to system nodes and to systems as show in Figure 20. Information exchanges are always generated between producing and consuming leaf activities and their associated op nodes. However, valid and consistent need lines on OV-2 diagrams are only obtained when information exchanges are formed from leaf activities at different nodes. Likewise, system data exchanges are always generated between producing and consuming leaf system functions and their associated system nodes. However, valid and consistent interfaces on SV1 diagrams are only obtained when system data exchanges are formed from leaf system functions at different system nodes. While exchanges can be generated, their DoDAF properties (transport times, security classification, etc.) can not be automatically filled in and, therefore, must be defined manually. This makes exchanges persistent architecture data in
102
that, once generated and their properties defined, they should not be deleted because their DoDAF property attributes will be lost. Need lines and interfaces, on the other hand, carry no properties and can be deleted and regenerated again as the (activity, system function) model grows and contracts with additional (or subtractive) (activities, system functions), (information, data) inputs/outputs, nodes, and (roles, systems). In ABM, because need lines and interfaces have been identified from the generation of exchanges, both OV-2 and SV-1 diagrams can be graphically populated with nodes and their corresponding need lines and interfaces. In fact, as many individual node-centric OV-2 and SV-1 diagrams can be graphically populated as there are operational and system nodes. This makes OV-2 and SV-1 expendable because they can always be repopulated with nodes and (need lines,
interfaces) and their associated exchanges as the architecture model changes and matures. The OV-3 product is, essentially, a spreadsheet document since it consists of the entire collection of information exchanges (and their properties) within an architecture model. Likewise, SV-6 product is a spreadsheet document since it consists of the entire collection of system data exchanges and their properties.
AnALysIs (stAtIc)
From the top level ABM architecture data model in Figure 15, it can be seen that the basic triple association is very simple and elegant yet very powerful. From this model, one can obtain a more detailed and complete analysis of complex architectures. In fact, one could say that all the
103
answers to static architecture analysis queries are already in the architecture datathat is the easy part. The hard part is determining the appropriate analysis queries. Four unique but related architecture techniques support the eventual mission outcome decisionmaking process as shown back in Figure 1. Core integrated architecture analysis. DOTMLPF analysis. Gap analysis of to-be architectures. Architect data mining of exchanges.
tion and their relations to system functions at system nodes producing/consuming data. Resource (who) analysis: Roles, systems and their activities and system functions.
dotmLPF Analysis
DOTMLPF analysis leads to better definitions of warfighting capabilities by being able to anticipate effects and assess impact of change on domains and by examining usage (who/what affects something) and references (who/what is affected by something). DOTMLPF domains map to ABM architecture element analysis as shown in Table 5.
104
known. Figure 21 shows how gap-analysis of to-be architectures reveals: orphaned activities: Activities at nodes without roles. orphaned systems: System functions at system nodes without systems.
By clustering and aggregating these orphaned elements and by performing gap analysis and assessments, new system and organizational requirements can be derived. This would support justifications for future funding decisions of new systems, components, and supporting operational organizations.
ments on how an enterprise operates. OV-3, SV-6 exchanges together with SV-5, as show in Figure 22, identify connections between producers and consumers at the functional leaf level. This is essential for what if and if what impact assessments between what is required and what is delivered. For example, one could assess the impact of losing a system or a system node on operations (activities, nodes, roles, etc). In addition, one could obtain a set of hidden requirements for an operational node and a role where such requirements would be derived from the indirect relationship between nodes and roles to systems, system nodes, and to system functions.
105
details on how or under what input/ output conditions PRODUCT (information, data) is produced/ consumed. They also do not explicitly identify, for each activity, the timing details or the number (capacity) of RESOURCES (roles, systems) needed or their ordering for the case when multiple roles perform the same activity (who operates on the first input, who operates on the second, etc). To appropriately assess measures of performance and effectiveness in an operational environment, dynamic modeling and simulation executable process model architectures need to be developed. An executable architecture is defined here as a dynamic (over time) model of sequenced processes/events (concurrent or sequential) performed at a node by roles (within organizations) using resources (systems) to produce and consume information (data). ABM was designed to capture sufficient representations of static architecture model descriptions that enable them to be transitioned into dynamic executable process models. Executable process modelsthe whEN (event) aspect analysisenables time-dependent behavior analysis and dollar cost assessment of complex, dynamic operations, and human and system resource interactions that cannot be identified or properly understood using pure static models.
Dynamic executable process models go beyond must be capable of and define precisely under what conditions information and data is actually produced/consumed and the exact number and ordering of roles. It can be used to show how to transform and evolve organizations, processes, and modes of operation to adapt to new roles, relationships, technologies, and threats. The transition is accomplished by starting with the extracted set of leaf activities to which (among others) dynamic processing time (duration) and any statistical time distribution, average wait time before processing, continuation strategy, activity cost, and input/ output conditions are all defined. By connecting and chaining these leaf activities according to the information exchanges defined between them, we can produce candidate process scenario thread models of sequenced actions. Roles and systems are the human/machine resources used by each process and they may have (among others) single/ periodic (un)availability times, set up times, capacity (quantity), processing strategies (FIFO, etc.), and hourly and fixed cost. External activities serve as sources of inputs and transition to triggers that start the execution process. External activities serving as destinations of outputs transition to outputs that terminate the execution process.
106
107
OV Activities - OV-5 Information OV-7 Operational Node OV-2 Role - OV-4 1) Activities with Op Nodes with Roles
SV System Function SV-4 Data SV-11 System Node SV-1 System SV-1 1) System Functions with System Nodes with Systems 2) Activities with System Functions SV-5 1) Generate System Data Exchanges 2) Complete SV-1with Interfaces 3) Generate SV-3 Systems-Systems Matrix 4) Generate SV-6
Automate
5) Generate EXChANGES and fill in properties 6) Complete NODE products OV2, SV-1, with Need Lines and Interfaces 7) Generate EXChANGE Products OV3/SV6
1) Generate Information Exchanges and Need Lines 2) Complete OV-2 with Need Lines 3) Generate OV3
108
For example, ABM does not use mechanism or control arrows per se with activities. For mechanisms, a different approach was taken based on the three-way association between FUNCTIONS, NODES, and RESOURCES. Because of the separation of RESOURCES into roles and system, systems can only be only indirectly associated with activities though SV-5. That is, systems are associated with system functions, which in turn, are associated with activities via SV-5. This is incompatible with the IDEF0 definition of a mechanism of an activity as being a system. For controls, a different approach was taken by defining an association between activities (system functions) and standards. Standards (from the DoDAF Technical Standards View) take the
5. Generate information exchanges and fill in properties. 6. Complete OV2 with need lines. 7. Generate OV3 operational information exchange matrix.
109
place of controls and can be associated with both activities and system functions. Figure 26 shows an example of this 2-way association. Again, consistency of building integrated architectures and generating exchanges is more important and takes precedence over adherence to strict IDEF0 modeling rules.
6. Generate system data exchanges and fill in properties. 7. Complete SV-1 with interfaces. 8. Generate SV-3 systems-systems matrix product. 9. Generate SV-6 systems data exchange matrix product.
110
Rule #2: Leaf FUNCTIONS (activities, system functions) must have at least one input and at least one output (different from each other) from/to either another FUNCTION (activity, system function) or an external FUNCTION (activity, system function). Rule #3: (Need lines, interfaces) within the same NODE (operational, system) or RESOURCE (role, system): one must first decompose the NODE or RESOURCE into sub-NODES and/or sub-RESOURCES and then reassocciate the appropriate FUNCTIONS (activities, system Functions) to the appropriate sub-NODES and or subRESOURCES.
111
time that, through various analysis and assessment techniques, provide real value to an organization, to an enterprise and, ultimately, to a decision maker and mission outcomes and objectives. In conclusion, the roadmap in Figure 27 validates the original premise from Figure 1. Architecture development guidance combined with compliant architecture tools and the activity-based methodology makes possible integrated architectures. Integrated architectures combined with simulation tools and scenarios render executable architectures. Integrated architectures, executable architectures, analytical tools, and methods render quantitative actionable architectures, which, in turns supports such decision-making processes as portfolio management, acquisition, JCIDS, and mission planning in support of mission outcomes.
to warfighters. The C2C architecture was the best true OV-5 representation of Constellation processes and was widely distributed to the C2 community. The architecture was published as part of the U.S. Air Forces Warfighting enterprise architecture (AF EA, 2005).
AcknowLedgments
The authors would like to acknowledge the United States Air Force Deputy Chief of Staff Office, Warfighting Integration (AF/XI), and United States Air Force Chief Architects Office (AF CIO/A) for their support in the development of ABM. The authors would also like to acknowledge the effort of Stanley Harris (of Lockheed-Martin Corporation) for his guidance, assistance, and contributions that made the activity-based methodology possible.
AvAILAbILIty oF Abm
ABM is in the public domain and is commercially available. Three major enterprise architecture technology companies have implemented ABM. Telelogic Corporation (Telelogic) has supported ABM in their System Architect product since 2004. This was followed in 2005 by Troux Technologies (Troux) when they implemented ABM as part of their DoDAF Template 1.1 for their METIS product. Proforma Corporation (Proforma) announced support for ABM in their ProVision product in 2006. These vendor products are widely used throughout DoD and Federal Government. In the recent DoD EA survey (Ring, & Johnson, 2005), 25% of those responding use ABM-based products in their architecture development environment. In one example of ABM usage, the U.S. Air Force employed ABM in the development of the Command and Control Constellation (C2C) v2.0 operational architecture (Sweet & Kanefsky, 2004). The C2C articulates the Air Force vision of a network-centric, peer-based family of systems providing decision-quality information
reFerences
C4ISR Architecture Framework, v2.0 (1997). December 18. Clinger-Cohen Act of 1996: Information Technology Management Reform, Public Law 104-106, Fiscal year 1996 Defense Authorization Act. (DoDAF, 2003) DOD Architecture Framework (DoDAF), V1.0, Vol. I and II, 15 August 2003 (DODI 8115.bb, 2006) DODI 8115.bb, Information Technology Portfolio Management, 2006 (FIPS 183, 1994) Federal information Processing Standards Publications 183, Integration Definition Function Modeling (IDEF0), June 30, 1994. www.idef.com Harrison, G. A., Benjamin, D. C., Elliot, L. G., Hutt, R., & Kern, H. S. (2005, September). Modeling and enhancing C4ISR with executable
112
architectures. The 2005 Fall Simulation Interoperability workshop, sponsored by Simulation Interoperability Standards Organization, Orlando, FL (pp. 18-23). (JCIDS, 2005) Joint Capabilities Integration And Development system (JCIDS), CJCSI 3170.01, 11 May 2005 Nicholson, D., Mercer, B., & Ang, H. (2005). Addressing conceptual deficiencies in DoDAF through an architecture specification model ASM. In Proceedings of Conference on Defense Transformation and Network-Centric Systems (Vol. 5820), SPIE, Orlando, FL. ORourke, C., Fishman, N., & Selkow, W. (2003). Enterprise architecture using the Zachman framework. Thomson Course Technology Publishing. Pawlowski, T., Barr, P., & Ring, S. J. (2004). Applying executable architectures to support dynamic analysis of C2 systems, #113, 2004. Command and Control Research and Technology Symposium, San Diego, CA. (Proforma) Proforma Corporation, http://www. proformacorp.com/ Ring, S. J., & Johnson, M. (2005). State of DoD Architecting. Command Information Superiority Architectures (CISA) Worldwide Conference, Omaha, NE, December 1, 2005
Ring, S. J., Lamar, B., Heim, J., & Goyette, E., (2005). Integrated architecture-based portfolio investment strategies. The 10th International Command and Control Research and Technology (ICCRTS) Symposium, McLean, VA. Ring, S. J., Nicholson, D., Thilenius, J., & Harris, S., (2005), An activity-based methodology for development and analysis of integrated DoD architectures. 2004 Command and Control Research and Technology Symposium, San Diego, CA. Sweet, N., & Kanefsky, S. (2004). The C2 constellation: A US Air Force network centric warfare program network centric applications and C4ISR architecture. 2004 Command and Control Research and Technology Symposium, San Diego, CA. Telelogic Corporation. www.telelogic.com Troux Technologies, www.troux.com U.S. Air Force Chief Architects Office (2005, May 31). United States Air Force Enterprise Architecture, CD-ROM. Zachman, J. A. (1987), A framework for information systems architecture. IBM System Journal, 26(3). Retrieved from www.zifa.com
113
114
Chapter VI
AbstrAct
For a successful study, design and development of the enterprise architecture, a thorough insight into the essence of the work and operation of an enterprise, is a crucial factor. As the well-known Zachman and other modern frameworks illustrate, enterprise processes and process modeling are one of the fundamental components of enterprise architecture for providing such an insight. Like building construction in which construction drawings or blueprints play crucial roles, enterprise process models are critical in developing enterprise architecture. Moreover, one may argue that the role of business process modeling in enterprise architecture is similar to the floor plan that defines the boundaries of a building to be constructed. Therefore, a suitable enterprise process modeling approach that could capture the essential operations and reflect the cross-enterprise (cross-departmental) processes is a needed component to complement enterprise architecture. In this chapter, authors study, discuss, and review the practical role of enterprise process modeling in enterprise architecture using a real life organization-based case study. Authors introduce a modeling methodology that captures essential activities not only within a process but also from the enterprise perspective where cross departmental or enterprise processes are represented.
IntroductIon
For developing business goals-oriented enterprise architecture, system designers need to seriously
focus on enterprise process perspective in such a task. This stand will not only allow organizations to achieve their business goals, but also enable them to better reconcile business and IT that
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
consumes millions of dollars invested into the enterprise IT infrastructure. In fact, enterprise architecture provides a high-level description and view of the primary resources of any enterprise (Anaya & Ortiz 2005). These primary resources include users (users), processes (business processes), and technology (hardware and software). However, the process or business process component of enterprise architecture represents the most central and fundamental, because it connects the other two resources (users and technology). Poor definition of business processes in an enterprise architecture leads to a number of problems such as business and IT gap. A number of tools, techniques, and methodologies are developed to support enterprise business process modeling that could ensure a well-developed enterprise architecture that guarantees achievement of business goals. According to Dalal, Kamath, Kolarik, and Sivaraman (2004), among multiple tools are data flow diagrams (DFDs), integration definition for function modeling (IDEF0), and activity diagrams in the unified modeling language that all have their roots in process modeling for software development. Similarly, a number of methodologies for enterprise business process modeling were developed, each taking a different philosophical stand such as organizational semiotics by Stamper (1988, 1997) and DEMO (Design & Engineering Methodology for Organizations) methodology by Dietz (2006). In this chapter, we use the language action perspective paradigm supported by a rigorous modeling technique based on Petri nets. The methodology is illustrated on a case study conducted in a small enterprise. Petri nets have been tested and used in enterprise process modeling and workflow management by many authors (van der Aalst & van Hee, 2002; Deiters, 1998; Jensen, 1997a, 1997b); however, in this chapter we discuss application of Petri nets based on the language action perspective. The main motive on using and adopting Petri nets in enterprise business process
modeling is their capability to model and analyze concurrency, choice, asynchronous completion, as well as their ability to visualize and simulate the modeled process. The type of Petri net introduced in this chapter is based on the language action perspective, or more precisely, on the transaction concept introduced in Dietz (1999). The transaction concept provides a transparent insight into the essence of enterprise processing irrespective of its realization or technical aspects. The concept is based on the notion that an enterprise is a network of business transactions that are exchanged daily while carrying out the mission of the enterprise and interacting with the environment (customers, partners). The remainder of this chapter provides an introduction to Petri nets, the transaction concept, and its underlying paradigmlanguage action perspective. The proposed methodology is illustrated on a case study conducted in a small enterprise. For those readers not familiar with the language action perspective, the background section contains a brief overview of this framework.
business Architecture
The business architecture component (domain, level, or subset) of the enterprise architecture (EA) framework represents an essential component and, therefore, in all different EA Frameworks it is given an important emphasis. In the well-known Zachman framework for enterprise architecture, business architecture is identified as business model. In the open group architecture framework (TOGAF), which provides a comprehensive approach to the planning, design, implementation, and governance of enterprise information architecture, business architecture is called business. Within the TOGAF, there are four types of architecture that are commonly accepted as subsets of an overall enterprise architecture. These subsets or components are:
115
A business (or business process) architecture that in particular defines key business processes. An applications architecture that provides a blueprint for the individual application systems to be deployed, their interactions, and their relationships to the core business processes of the organization. A data architecture that describes the structure of an organizations logical and physical data assets and data management resources. A technology architecture that describes the software infrastructure intended to support the deployment of core, missioncritical applications. This type of software is sometimes referred to as middleware.
ness process requires a more holistic (integrated) approach rather then an isolated approach (Lopez & Genovese, 2004; Taft, 1996). In developing realistic and accurate enterprise architecture, the modeled business process should be capable of dealing with a very detailed level of analysis. In this respect, McDavid (1999) refers to an old saying the devil is in the details. He suggests that for a useful architectural approach, analysts need to be able to represent and organize the complete range of details relevant to the business processes. Thus, this chapter is an attempt to tackle the details of business processes relevant to the overall objective of a business architecture and enterprise architecture.
bAckground
The third framework that is noteworthy is the one derived from a practical project and a real life system within the U.S. National Institutes of Health (NIH). National Institutes of Health is the part of the U.S. Department of Health and Human Services that serves as a primary Federal agency for conducting and supporting medical research. The enterprise architecture framework of NIH, which is based on the Federal enterprise architecture, consists of three distinct architecture areas: business architecture, information architecture, and technology architecture. The intention of this brief introduction of a few EA frameworks, which resulted from research studies as well as specific projects, is to highlight the critical and strategic place of business architecture within the EA framework. Furthermore, it is important to stress the importance of business process, the need for holistic approach in business process, and detailed level analysis of business process. Since business processes constitute the foundation in a business architecture (Herman, 2001), in this chapter the main emphasis is put on business processes and the use of modeling for process elicitation. Also, it should be noted that in order to develop enterprise architecture, busiThe increasing interest in studies on enterprise architecture and its components is a clear manifest of considering business process management as a backbone of enterprise architecture. Advocates of business process management, within the enterprise context, claim that accurate incorporation of business processes into enterprise architecture development prevent disastrous IT failures. A significant portion of enterprise budgets is consumed by IT (Carr, 2003), that is, IT failure exposes ever-increasing consequences and disaster for businesses. Thus, the inclusion of enterprise business process into enterprise architecture development should be considered of vital importance for success. One of the challenges in enterprise business process study is the adequacy, simplicity, integrity, and computer support of methodologies and tools used for this purpose. The difficulty arises from the fact that different methodologies and tools came out of experiences and expertise of authors with certain predetermined scope. While some methodologies are well zoomed and focused on one aspect, they lack strength in another aspect; for instance, a methodology may provide a profound theoretical
116
concept but lack clear diagrammatic notations or computer support. In this chapter, the transaction concept and Petri nets are integrated to furnish enterprise systems designers and developers with better tools. This arsenal is further complemented by rigorous graphical notations of Petri nets extended for the language action perspective. The transaction concept, authored and introduced by Dietz (1994, 1999, 2002), is based on the language action perspective looking at communication as a representation of actions. The transaction concept, that will be discussed later, is about how communication leads to actions and can serve as a basis for capturing essential business processes within an enterprise. It is very natural that people describe their work and activities in a natural language. People use natural language to communicate while conducting business and carrying out tasks, therefore, the transaction concept is a profound tool to watch and observe communication in an organization in order to identify patterns of action. In order to put these patterns of action in a meaningful order, visualize these patterns, build a complete model of these patterns, analyze the model, and communicate the results back to the users, clear and readable graphical notations are needed. For this purpose, the rich graphical notations of Petri nets are combined with the transaction concept that resulted in transaction-oriented Petri nets methodology, or TOP methodology for short. The concept of language action perspective traces its origins to the speech act theory stating that language is not only a means of exchanging information but also a means of social activities or actions (Austin, 1962). Austins historic work, How to do things with word, paved a profound road for extensive research interest resulting into what is now known as the language action perspective and communication modeling. The Austin theory was further advanced and complemented in the works of Searle (1969), who presents a theory
of speech acts relying on the notion of constitutive rules (Habermas, 1984; Medina-Mora, Winograd, Flores, & Flores, 1992; Winograd & Flores, 1986). The work of Winograd and Flores introduced a modeling approach that illustrates conversation for action as sequences of communicative acts involving two actors. Their schema conversation for action was further developed by Dietz (1999) in the concept of business transaction, the core concept of the DEMO methodology. This chapter is based on the transaction concept as introduced within the DEMO framework and using Petri nets as a modeling technique.
117
Standard (or elementary/classic/low level) Petri nets (Peterson, 1981) in which token are identical or indistinguishable. Colored Petri nets in which each token has value, thus tokens are different or distinguishable (Jensen, 1997a, 1997b). Hierarchical Petri nets in which certain elements (e.g., a transition) of Petri nets encompasses a subnet or entire Petri nets. High level Petri nets usually represent colored and hierarchical Petri nets (Reisig & Rozenberg, 1998). Stochastic Petri nets add non deterministic time (Haas, 2002). Timed Petri Nets in which transitions are assigned duration weight. Predict/transition nets (Pr/T-nets). Workflow Petri nets (van der Aalst et al., 2002), etc. Definition: Petri nets are a graphical and mathematical modeling tool that is particularly well suited for discrete event systems. The Petri nets diagrammatic structure consists of places, transitions, and directed arcs as depicted in Figure 1. Places can contain tokens (one or more). Graphically, places are represented by circles (or ellipses), transitions by rectangles (or bars), and tokens by black dots (or numbers). Place: (two types) Input place and output place: an input place may represent input data, condition, command, request, or material; an output place may represent a state or a result achieved after its corresponding
activity (transition) takes place. Places can contain tokens that illustrate the current state of the modeled system (the marking). The marking used to describe the initial state of the system is called the initial marking. Transition: A transition represents an action, process, operation, or any activity that changes the state of the system or causes advances and progress in a process. Arc: In its common role, an arc illustrates the course of actions, the flow of processes, or the sequence of operations. Token: Tokens are indicators of the systems state. Thus, an overall distribution of tokens represents the overall state of the system at a given time. The current state of the modeled system is given by the number of tokens in each place or by type if the tokens are colored (distinguishable).
118
considers communication as a way of acting and carrying out certain tasks. Each business transaction encompasses action and interaction as illustrated in Figure 2. The action is the core of a business transaction; it represents an activity that changes the state of the world or creates a new fact. The interaction is either for initiation of an action or communication of a fact as the result of the action. For example, an interaction can be a request made by one actor toward another actor that leads to creation of a new fact; an interaction can be also click of apply button or submit in an electronic form; or inserting debit card into the ATMs card reader to withdraw cash. Example 1a: A customer applies for a home mortgage to a loan officer in a bank. The first interaction takes place when the customer communicates with the officer to request a loan and submits an application. Then the officer processes the application, checks the documents, and makes a decision, that is, takes an action. The second interaction takes place when the officer, after processing the application, communicates the decision to the customer.
place; these phases are abbreviated as O, E, and R correspondingly. They are also referred to as OER concept illustrated in Figure 3 using Petri net notations. The order (O) and result (R) phases are interactions and the execution (E) phase is an action. In order to distinguish between action and interaction, the action (execution phase) is represented by a different color. This differentiation makes more meaningful sense when conducting modeling. On the left side of Figure 3, a transaction is represented as a sequence of the three phases, while for compactness, the right side of the figure compresses the three phases into one box called a transaction (T). The need of decomposing a transaction into three phases or compressing them into one box arises when modeling complex enterprise processes, in which numerous transactions are chained together and nested into each other. A simple transaction is carried out in a straightforward manner without involving (triggering or causing) another transaction (or transactions) during its entire execution. Thus, it is unnecessary to split a simple transaction into three phases, and therefore a compact notation is used. Using the compressed notation will help to build more compact models of enterprise processes, while the expanded notation will help
As the mortgage example shows, the process has three stages: the first interaction, the action, and the second interaction. Accordingly, as illustrated in Figure 3, the transaction concept states that each business transaction consists of three phases called the order, execution, and result phases. The order phase is the first interaction, the result phase is the second interaction, and the execution phase is where the action takes
Figure 3. The transaction structure using Petri nets diagram (detailed and compact notations)
OER
+
Action
Transaction
119
to show if a transaction is nesting other transaction(-s) within it. Example 1b: In the requesting mortgage transaction, the application processing triggers another transaction checking credit. In order for the officer to approve or decline the application, he or she needs to check the customers credit history with an authorized credit reporting agency. It means the requesting mortgage transaction is a composite transaction that nests the checking credit transaction. Thus, the requesting mortgage transaction starts first and the checking credit transaction starts afterward, but the requesting mortgage transaction cannot be completed until the result of the checking credit transaction is not known.
Executor: officer Result: mortgage is approved Transaction 2: checking credit Initiator: officer Executor: credit agency Result: credit report is generated From the two previous transactions, Transaction T2 must be initiated and executed during Transaction T1, as depicted in Figure 4. Thus, initiation, execution, or completion of a business transaction may lead to initiation and execution of new transactions. In this way, transactions are chained into arbitrarily large structures, called business processes (Dietz, 1999). The actual sequence of actions is shown Figure 4b. According to this diagram, the execution of Transaction 2 takes place as part of the execution phase of Transaction 1. This simple model should be read in the following manner: Transaction T1 starts with order phase (T1/O); the execution phase of this transaction (T1/E) nests Transaction T2, that is, the execution phase of Transaction T1 starts and then it triggers Transaction T2 that should be completely executed and the result should be
Based on the previously modified description of the mortgage process, the following is a business process model using the transaction concept: Transaction 1: requesting mortgage Initiator: customer
Figure 4. (a) A composite transaction; (b) A composite transaction indicating the action flow and process boundary
T1/O
T1/O
Bank
T2 T1/E T1/E T1/E T2
T1/R
T1/R
(a)
( b)
120
returned back to T1/E in order to complete T1/E. Once the result of Transaction T2 is returned and the execution phase of Transaction T1 (T1/E) is also completed, it proceeds to the result phase (T1/R). The result phase of Transaction T1 means that the mortgage decision is communicated to the customer. In real life, enterprise processes are more complex than the mortgage example that is intentionally simplified in order to evade an indepth discussion at this stage. Now that the transaction structure is explained, it is necessary to look at the roles of the actors involved in a business transaction. As is apparent from the mortgage example, each transaction involves two actors. The actor that initiates the transaction is called the initiator of the transaction (e.g., customer, client, consumer, submitter of electronic form), while the actor that executes the transaction is called the executor of the transaction (e.g., supplier, server, provider, IT application). Actors can be humans, software agents, or machines. For example, if the mortgage application is submitted online, a software agent will collect data and process the application instead of the loan officer and make preliminary estimates for later approval by a human actor (the loan officer). Now that the transaction concept is introduced, it is appropriate to give a definition of business transaction used in this chapter. Definition: A business transaction is a generic pattern of activity carried out in a close interaction between two distinct actors called the initiator and executor. The activity is carried out in three phases, called the order phase (O), execution phase (E), and result phase (R), that create a new fact or change the state of the world. These three phases are made up of interaction and action, in which the order and result phases represent the interaction and the execution phase represents the action.
The following is a definition of enterprise process in the framework of the methodology that is applied in this chapter based on the transaction concept. Definition: An enterprise business process is a network of interrelated business transactions that delivers value (good or service) to a customer having one start point and one end point. It starts with a request by an actor and ends with a result communicated to the same actor. Usually a business process is one super transaction that nests multiple transactions in it.
121
are transitions and thus represented by different types of rectangles. Further, the proposed extensions suggest two places, a start place and an end place that indicate where a process starts and where it eventually ends. These two new places are used along with the standard Petri nets element called state that shows the intermediate states of processes (transactions). Again, in terms of the Petri nets concept, all these elements are places and thus represented by different types of circle. For distinguishing between intra-organizational and inter-organizational processes, the process boundary element is added. Introduction of this element helps when analysts need to model or illustrate the interaction of one process with another process within an organization or with the environment. This interaction can be modeled with a set of places between the process boundaries. The final extension concerns the introduction of an optional link. In standard Petri nets, all input places must hold in order for a transition to be executed, that is, execution of a transition
is guaranteed only whenever all its input places have a token in them. Optional links weaken this assumption and therefore allow the analyst to represent situations where the transition is executed, even when a state represented by its input places does not hold. For instance, prior to applying for a policy, customers usually request a quote. However, it is entirely possible for customers to apply for a policy without first requesting a quote. Thus, the relationship between requesting a quote and applying for a policy is an optional one.
122
call processing, inventory control, admission to hospital, new member enrollment, insurance claim processing, etc.). Then each of these major business processes is studied and described as a network of business transactions (essential activities), in which each transaction involves two actors, one initiator of the activity and one executor of it. According to the transaction concept, an activity is considered as a business transaction if it creates a new fact, changes the status of the system, or brings results. Now having this in mind, the following is a high-level framework to follow: Definition of major business processes: This step is a high-level definition of major processes that can be done by reading the documentation of an organization. Examples of a major process can be order processing, goods delivery, procurement, restocking, etc. Usually, these major processes are interrelated and all together constitute the mission of the organization. Description of each major business process: This step is either based on documentation of an organization where processes and procedures are described, or such a description can be prepared through interviews with the manager of a specific business process. Experience shows that even if a written documentation is available, interviews still need to be conducted for clarification and further information. Identification of business transactions (core activities or key processes) and relevant actors for each major business process: In this step, identify transactions (main activities) that cause changes in the states of the process and advance the process. Identify who is the initiator and who is the executor for each transaction. According to the transaction concept, the initiator and the executor are two distinct actors. Construction of model(s) of each major business process: In this step, using the
notations of the TOP methodology, all the identified transactions are put together in sequential order. These steps and the TOP methodology are applied and tested through a series of case studies. The following section will discuss one of these case examples.
123
consist of auto claims and homeowner claims. If approved, the regional office notifies the agent and the agent tells the client that they are approved and a contract is generated. All contracts are pre-made by the system with added information about the customer and car. The contracts are produced at the regional office and sent to the customers agent who adds the type of coverage the customer has. The agent then explains what is and is not covered under the plan and asks the client to sign the contract. By signing the contract, the customer pays an initial payment to start the coverage when approved. The customer is issued a temporary insurance card, and the official card is mailed to the customer at a later date. If the client is not approved by the regional office, the agent notifies the client and all transactions between the client and agent end there. SSM insurance companys regional office does not deal with customers directly. The agents are the primary contact for customers.
124
T1: Requesting for a quote Initiator: customer Executor: agent Result: a quote is given After completion of this transaction, the customer may decline or consider applying for an insurance policy. If the customer decides to apply for a policy, this will constitute the second transaction: T2: Applying for a policy Initiator: customer Executor: agent Result: a policy is issued In order for the agent to proceed, the agent must request approval of the regional office, which checks the customers background: T3: Requesting regional approval Initiator: agent Executor: regional office Result: approved/declined If the approval is given, the agent asks the regional office to generate a contract based on the inputs of the customer: T4: Generating a contract Initiator: agent Executor: regional office Result: a contract is generated Now the agent reviews and explains the prepared contract to the customer (agent and customer). If the customer agrees to the terms and conditions of the contract, the agent requests the customer to sign the contract and make the initial payment: T5: Paying for the policy Initiator: agent
125
T2/O
T1
T3 T2/E
T5
T4
Environment
Agent office
T2/R
Regional office
initiated in the agent office, executed in the environment, and the result is communicated back to the agent office. Finally, the circles positioned between the agent office and the regional office models intra-organizational processes. One more aspect of the Figure 6 is the distinction between intra-organizational and inter-organizational processes. For example, Transactions T3 and T4 are inter-organizational processes. In this case, the actors involved are not persons but rather organizations; however, detailed discussion of this matter will be left for a future opportunity. In Figure 6, focus is placed on the insurance policy issuance process; therefore, the other processes such as reviewing claims and reviewing current members are not discussed; however, their analysis and modeling should not be difficult following the same manner as with the policy issuance process.
126
quirements, and demonstrably supporting and facilitating the enterprise to achieve its business objectives.
reFerences
Anaya, V., & Ortiz, A. (2005). How enterprise architectures can support integration. In Proceedings of the 1st International Workshop on Interoperability of Heterogeneous Information systems. Austin, J. L. (1962). How to do things with words. Cambridge, MA: Harvard University Press. Carr, N. G. (2003). IT doesnt matter. Harvard Business Review, 81(5). Dalal, N. P., Kamath, M., Kolarik, W. J., & Sivaraman, E. (2004). Toward an integrated framework for modeling enterprise processes. Communications of the ACM, 47(3). Deiters, W. (1998). Information gathering and process modeling in a Petri net-based approach. In W. van der Aalst, J. Desel, & A. Oberweis (Eds.), Business process management: Models, techniques, and empirical studies. Berlin; Heidelberg; New York: Springer-Verlag. Dietz, J. L. G. (1994). Business modeling for business redesign. In Proceedings of the 27th Hawaii International Conference on System Sciences (pp. 723-732). Los Alamitos; IEEE Computer Society Press. Dietz, J. L. G. (1999, November). Understanding and modelling business processes with DEMO. In Proceedings of the Annual International Conference on Conceptual Modelling (ER99), Paris. Dietz, J. L. G. (2002). The atoms, molecules, and matter of organizations. In Proceedings of the 7th International Workshop on the LAP, Delft, The Netherlands. Dietz, J. L. G. (2006). Enterprise ontologyTheory and methodology. Springer.
conclusIon
This chapter discussed both the role of business architecture as a subset of enterprise architecture framework and business processes as the foundation of business architecture. The discussion opened with consideration of enterprise process modeling as a crucial component in developing adequate enterprise architecture. In order to study, model, and visualize enterprise processes, the chapter introduced a comprehensive methodology based on language action perspective. The applicability of the methodology is tested on a small case study demonstrating that enterprise processes are cross departmental and cross organizational by nature. Although more complex examples and case studies are needed to explore the full benefit of process modeling in developing detailed enterprise architecture, it is not difficult to draw some conclusions based on the enterprise case study discussed. Enterprise processes are cross departmental with interaction with the business environment. Transactions exchanged between different actors may cross boundaries of a single process and expect results from other processes. Thus, enterprise processes are truly a collaborative network of business transactions. Revelation of these characteristics of enterprise processes greatly help system designers, especially enterprise architectures, to define the boundaries and underlying IT infrastructure more precisely in order to support the enterprise processes. Therefore, definition of enterprise processes may serve as a blueprint in developing enterprise architecture.
127
Goldkuhl, G. (2005, June). Beyond communication loopsArticulating the principle of multiresponsiveness. In Proceedings of the 10th International Working Conference on the Language Action Perspective on Communication Modeling. Kiruna, Sweden. Goldkuhl, G., Lind, M., & Seigerroth, U. (1998). The language action perspective on communication modelling. In Proceedings of the 3rd International Workshop on LAP, Department of Informatics, Jnkping International Business School, Sweden. Haas, P. (2002). Stochastic Petri nets: Modelling, stability, simulation. New York: SpringerVerlag. Habermas, J. (1984). The theory of communicative action: Reason and rationalization of society. Cambridge: Polity Press. Herman, J. (2001). Creating a business architecture. Business Communication Review, 22-23, December. Jensen, K. (1997a). Coloured Petri nets. Basic concepts, analysis methods and practical use. Volume 1, Basic Concepts. Monographs in Theoretical Computer Science, Springer-Verlag, 2nd ed. ISBN: 3-540-60943-1. Jensen, K. (1997b). Coloured Petri nets. Basic concepts, analysis methods and practical use. Volume 2, Analysis Methods. Monographs in Theoretical Computer Science, Springer-Verlag, 2nd ed. ISBN: 3-540-58276-2. Lopez, J., & Genovese, Y. (2004). Shift to integrated business architecture. Gartner, Inc.
McDavid, D. W. (1999). A standard for business architecture description. IBM Systems Journal, 38(1), 12. Medina-Mora, R., Winograd, T., Flores, R., & Flores, F. (1992). The action workflow approach to workflow management technology. In J. Turner, & R. Kraut (Eds.), In Proceedings of the Conference on Computer-Supported Cooperative Work, CSCW92. New York: ACM Press Peterson, J. L. (1981) Petri net theory and the modelling of systems. Englewood Cliffs, NJ: Prentice-Hall, Inc.. Reisig, W., & Rozenberg, G. (1998). Lectures on Petri nets I: Basic models. Advances in Petri Nets, Lecture Notes in Computer Science, Vol. 1491. Springer-Verlag. Searle, J. (1969). Speech acts: An essay in the philosophy of language. Cambridge: Cambridge University Press. Stamper, R. K. (1988). MEASUR. University of Twente, Enschede, The Netherlands. Stamper, R. K. (1997). Organizational semiotics. In J. Mingers, & F. Stowell (Eds.), Information systems: An emerging discipline. London: McGraw Hill. Taft, D. K. (1996, October). Anderson sets enterprise blueprint. Computer Reseller News, October 28, p. 132. van der Aalst, W., & van Hee, K. (2002). Workflow management: Models, methods, and systems. MIT Press. Winograd, T., & Flores, F. (1986). Understanding computers and cognition: A new foundation for design. Ablex, Norwood.
128
129
Chapter VII
ABSTRACT
The Singapore government enterprise architecture is a blueprint that will provide a holistic view of business functions, supporting data standards, and IT systems and services, regardless of the organisational structure and ownership of these functions and systems. The blueprint will also enable analysis of IT investments and their alignment to business functions, as well as facilitate collaboration among government agencies. When implemented, the Singapore government enterprise architecture will help bring about transformation in public sector by yielding optimised end-to-end business processes and system capabilities in alignment with government enterprise needs and missions.This chapter presents the considerations and approach taken to develop the Singapore government enterprise architecture. It examines the linkages of enterprise architecture with other initiatives such as the e-government action plans, policies, and processes related to IT governance, as well as summaries of lessons learned.
INTRODUCTION
The Singapore government enterprise architecture is a blueprint that will provide a holistic view of business functions, supporting data standards, and information technology (IT) systems and services, regardless of the organisational structure
and ownership of these functions and systems. It comprises four elements and reference models for the business, information, solution, and technical architectures. Of the four elements, the technical architecture has been developed in 2002 while the other three are currently being developed.
Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
The Singapore government enterprise architecture is to support e-government, and in particular, realise the outcomes of networked government where many agencies integrate across organisational boundaries to provide citizencentric services.
SINGAPORE E-GOVERNMENT
E-government is about enabling our government to harness info-communications technology (ICT) to better serve our citizens and businesses, and to deliver public services with greater convenience, effectiveness, and efficiency. For the Singapore public service, our e-government journey started in 1980 with the launch of the Civil Service Computerisation Programme.
the public sector in the delivery of public services by harnessing ICT technology. Launched in June 2000, the vision of the first eGAP was to be a leading e-government to better serve Singapore and Singaporeans in the new knowledge-based economy. The objective was to foster a shared vision of a leading e-government in the new millennium, develop a public sector that could contribute positively and work actively at propelling Singapore forward in the new economy, and provide a framework for informed, coordinated, and flexible ICT deployment. To move businesses, citizens, public officers, and the government toward the e-government vision, the first eGAP prescribed the broad directions of ICT deployment with five strategic thrusts and six programmes. The five strategic thrusts of the first eGAP were: 1. 2. Re-inventing government in the digital economy. Delivering integrated electronic service delivery. Being proactive and responsive. Using infocomm technologies to build new capabilities and capacities. Innovating with infocomm technologies.
3. 4. 5.
The six programmes identified to drive the strategic thrusts in the first eGAP include: 1. 2. 3. 4. 5. 6. Knowledge-based workplace. Electronic services delivery. Technology experimentation. Operational efficiency improvement. Adaptive and robust infocomm infrastructure. Infocomm education.
The key focus of the first eGAP was transforming the way the public sector interacts with its customers. Primarily, all public services deemed feasible for electronic delivery were designated for this transformation. The public sector would
130
need to better understand the impact of ICT, continually innovating and adapting business and operational processes to re-engineer, and totally transform the way things were done. In line with Singapores vision for service excellence, this plan would see an increase in the number of electronic services or e-service provisions to customers in three frontscitizens, businesses, and within the public service. The first eGAP covered the period 2000 to 2003. By the time it concluded in 2003, its achievements and accolades include the following: 1. One of the most advanced e-governments in the world as reflected in international benchmark studies by third parties. Singapore was ranked among the top leading e-governments by both accenture and the world economic forum, and also won several international e-government awards. Over 1,600 public e-services have been implemented. In a study of e-governments
3.
worldwide, Singapore was ranked second by Brown University at putting public services and information online. Our citizens are generally satisfied with e-government and with the quality of our e-services.
2.
While the first eGAP had provided the common vision for agencies in their ICT deployment, it was important to continue to engage all agencies in the conceptualisation and implementation of common systems, especially with gradual decentralisation of budgets as well as ICT deployment decisions to these agencies. Continual efforts would have to be put in to encourage and ensure that agencies pool their resources in the development of ICT applications with similar functionalities. Such engagement and customer-centric approach to delivering public services from the foundation laid by first eGAP would continue into the second eGAP.
Networked Government
Fostering Inter-Agency Collaboration
131
Our efforts in implementing e-services have been recognised internationally as well. Notably, we received the United Nations Public Service Award 2005 for the Online Business Licensing Service (www.business.gov.sg), an integrated e-service, which offers businesses a total of 69 licenses from 19 government agencies and allows 80% of all start-ups in Singapore to apply online for the licenses needed to start their businesses. The award was given to recognise the governments efforts to streamline, simplify, and integrate the application of licences from various agencies to save time and costs for enterprises. Overall, we have continued to do reasonably well for eGAP II and our achievements have ensured that Singapore continues to be ranked amongst the leading e-governments by international benchmarking studies conducted by the World Economic Forum, Accenture, and United Nations e-government survey.
132
platforms across agencies became paramount. Moreover, cost benefits could be realised through the use of common systems and platforms for the deployment of e-services, and demand aggregation for the procurement of compatible technology products. Hence, a practical approach by way of a public sector service-wide technology standard for agencies was necessary. This technology standard blueprint called the service-wide technical architecture (SWTA) was developed to provide a consistent framework for the effective management and protection of the public sectors IT assets that were implemented across the agencies. According to META Group (1999b), the development of such a technical architecture still offered the greatest opportunity for IT organisations to deliver prompt value to their business.
The SWTA, which was one of the key initiatives under the first eGAP, helped to create a better environment for interoperability and information sharing within the public service. The first five domain architectures in SWTA were published in October 2002. By April 2003, a total of nine domain architectures, as shown in Figure 2, were developed and published.
Application
Data Management
Middleware
Platfo (Clien t)
rm (S
erver)
Security
133
architectures was to explore the development of enterprise architecture. This programme, identified in eGAP II, would increase cross-agency collaboration and systems integration, enable more innovative and business-transforming projects to be initiated and completed, and improve the public services ability to anticipate and respond to rapid changes in the technology landscape when successfully executed. Reviews were conducted to glean insights into enterprise architecture practices, their implementation at a government-wide level, and the approaches taken by other e-governments. Some of the key findings are summarised next starting from enterprise architecture components and concepts, and expanding into their implementations in other countries. 1. Enterprise architecture would comprise four elements, namely the business, information or data, solution or application, and technical architectures according to META Group (1999a, 1999b), U.S. CIO Council (1999) and the Open Group (2002). An architectural framework provided a logical structure for classification and organisation of the four architecture elements, as well as guidance for developing architecture and systems implementation. TOGAF and Zachman were some of the frameworks reviewed. The open group architectural framework or TOGAF, originally used for developing technical architectures, was enhanced in the current version to develop other enterprise architectures elements as well. TOGAFs strength would be its architecture development method, a generic process consisting of eight phases for developing architecture (Open Group, 2002). The Zachman framework consisted of a two-dimensional matrix classification scheme in six columns (by what, how, where, who, when, and why) and five rows (by plan-
3.
4.
2.
ner, owner, designer, builder, and contractor perspectives) for describing an enterprise appears comprehensive (Zachman, 1997). However, the Zachman framework did not have a process for developing an enterprise architecture, and the completion of such a matrix, either partially or full, for the wholeof-government seemed daunting. In a government environment, enterprise architecture was deemed to be applicable at both government-wide and agency levels. Although both enterprise architecture implementations were conceptually similar, the construct was more complex in a government-wide context due to the scale and range of functions and diversity of the environment. Government-wide enterprise architecture provides a service-wide perspective of business functions and their IT initiatives. In this context, the Canadian and U.S. Federal Governments have published reference models. The enterprise architecture effort in Canada comprises the business transformation enablement program and the governments of Canada strategic reference models, which had evolved over the last 15 years from the municipal level governments reference model called the public service reference model to the provincial level government 10 years ago (Canada Treasury Board Secretariat, 2004). In the United States, the federal enterprise architecture reference model framework comprised the performance, business, service component, data, and technical reference models. These five reference models provided a classification scheme for government business operations and IT assets, and enabled the U.S. Federal Governments identification of collaboration opportunities and initiatives within five lines of business. In addition, it also facilitated the analysis of IT budgets and investments (U.S. Government Accountability Office, 2004;
134
5.
U.S. Office of Management and Budget, 2005). It was also noted that the deliverables, documentation, and approaches for enterprise architecture were varied. Carbone (2004) had described that existing enterprise architecture approaches were too complex and theoretical and had proposed a simpler and improvised approach, such as the use of the Gane/Sarson methodology for diagramming. Whittle and Myrick (2005) asserted that formal models and architectures were virtually nonexistent for business enterprises and highlighted several models to describe a business architecture enterprise. Lastly, Perks and Beveridge (2002) had
articulated the well-established processcentric TOGAF phases with clearer descriptions and details for practitioners use. These reviews from authors-practitioners showed that enterprise architecture deliverables and approaches needed to be fit for purpose intended and required customisation. Hence, the Singapore government would adopt a federated architecture approach similar to the United States government. Reference models would need to be developed to serve as the wholeof-government enterprise architecture framework, with a suitable methodology and/or process as part of the framework to provide the guidance for architectural development. These reference models would enable new initiatives and projects
135
on common business functions and IT assets to be identified. The architectural documentation requirements would require continual research and localisation.
4.
delivery in a systematic and well-disciplined manner. Technical architecture: This element details the organisations technology strategies, its extended technology linkages, and their impact on business initiatives.
Our Approach
Out of the four elements in SGEA, only the business, information, and solution architectures would need to be developed as the technical architecture element was already addressed by the SWTA. The development of these EA elements would require substantial time and resource, and the same for its maintenance as well. Some of the key considerations underpinning the formulation of the strategy for the SGEA programme are as follows: The implementation of a government-wide EA would enable the identification of common business processes to be streamlined, duplicative systems to be consolidated, and common systems to be implemented, leading to overall efficiency and effectiveness. The Singapore government had previously implemented several service-wide initiatives, which effectively constitute components of an EA. In developing the three remaining elements in SGEA, the strategy would be to leverage on these existing initiatives rather than start from scratch. There was a need for early results to demonstrate value and relevance of enterprise architecture to all stakeholders. Hence, the EA deliverables were intended to be purpose-driven, focusing on usefulness and relevance rather than comprehensiveness. Lastly, the implementation of SGEA would be a means to effect business transformation in the Singapore public sector.
2.
3.
136
government-wide lines of businesses and business functions. This would be sufficient to methodically identify agency collaboration opportunities or determine the need for common service-wide initiatives. A top-down whole-of-government and business-driven approach was preferred for the development of government BA. Executive sponsorship and strong participation of business personnel was key to the success of the government BA effort. The stakeholders included chief information officers and corporate planning and strategic planning directors who were engaged for their directions throughout the BA development process. Their inputs and information on the business functions and agency level priorities were analysed and integrated into the government BA. This enabled government leaders to focus on priority areas instead of being overwhelmed by the voluminous information available. The information for government BA was compiled into a structured format called the Singapore
Community Development
Economic Development
Family Development
Homeland Security
National Defense
Culture &Recreation
Energy Management
Environmental Mangement
Financial Assistance
Monetary Collection
Workforce Management
Asset Management
Administrative Services
Public Communications
Professional Services
Finance
Human Resource
Transportation
Education
Health
137
government business reference model, which defined the business operations of the government using terminologies that were common across all government agencies as shown in Figure 4 diagram and described next. 1. The business reference model in Figure 4 has two broad categories of lines of businesses. Under the services to public category are 24 lines of businesses, which are external facing services that the Singapore government provides to citizens, businesses, and external stakeholders. Examples of these include the family development, public transportation, and revenue collection lines of businesses. Under the corporate & supporting services category are nine lines of businesses representing all activities that support the delivery of services provided by the Singapore government to the public and all activities to operate the government effectively. Examples of these include project & logistics management, human resources, finance etc. Within each line of business are a set of related business functions and descriptions. For instance, continuing education & training and primary and secondary education are two business functions under the education line of business. In addition, the business reference model would also include a set of cross-functional matrix of business functions performed by government agencies.
streamlining opportunities, resulting in generic business processes for use across the government or within a sector. The generic business processes and related information will then be incorporated as part of the desired future state (i.e., target architectures).
2.
3.
The Singapore government business reference model will be used to identify business functions that: (a) are resource-intensive or (b) are potential candidates for inter-agency collaboration. Each common business function within could comprise business processes with the potential for streamlining. The identification of such common business processes would facilitate optimisation and
138
5. 6. 7.
At the point of writing, the focus for the DRM was on the data elements in the existing three data hubspeople hub, business hub, and land hub. At present, the three data hubs have mechanisms established to facilitate the sharing of commonly used people, land, and businesses-related data. The people hub is a centralized database on common non-sensitive people data (e.g., contains unique identification number (UIN) for all Singapore citizens and residents). The land hub is a one-stop resource centre for comprehensive and accurate digitised land data in map and textual forms. The fundamental land base information includes buildings, roads, and cadastral data, which are the basic land information that are required in the development of most map-based systems. The business hub is a centralized database containing a comprehensive range of information pertaining
to businesses in Singapore. The types of business data captured include company/business identification number and particulars, company/business profile, name history, capital, and shareholders share details. The initial DRM is planned for release in 2006. The envisioned seamless information exchange between data owners, government agencies, and the public resulting from the use of the DRM and implementation of government IA is depicted in Figure 5.
139
systems and services identified from collaboration opportunities and common business processes drawn from the government BA and existing ICT systems consolidated and implemented as shared components, which are reusable by agencies. Cost savings can then be better realised through such consolidation and standardization efforts. At the point of writing, the government SA was at the stage of development. The government SA is targeted for implementation from 2007-2010 and would cover several public facing services as well as corporate and supporting services.
provides a semantic framework for information sharing and interoperability of systems amongst all agencies. A review process is carried out every half-yearly with agencies to ensure the currency of SWTA and its relevance to enterprise architecture development. The SWTA architectural principles are highlevel statements that describe preferred practices followed in the design and deployment of ICT in the public sector. The principles covered the following: (a) infrastructure reuse, (b) modular architecture, (c) open standards, (d) robustness, scalability, adaptiveness, and performance. The SWTA framework consists of domain architectures, which are logical groups of related technologies. The content of each domain architecture includes: 1. 2. Technology components: Description of relevant technology components. Technology standards: International and industry standards that apply to the technology components selected and their status in terms of technology maturity. Products: These are specific products in this domain.
3.
140
4.
5.
6.
7.
Interoperability standards: The standards and requirements that are mandatory for inter-agency interoperability. Central services: Government-wide services that have been implemented and may be leveraged in this domain. Best practices: Guidelines or practical advice based on the experience and research of project teams for implementing specific domain technology components or products. Technology watch: Promising technologies that warrant further research and analysis for purpose of the domain.
(f) middleware, (g) platform, (h) network, and (i) security. A diagram showing the nine SWTA domain architectures within is given in Figure 6.
There are nine domain architectures and these include: (a) application, (b) collaboration and workflow, (c) data management, (d) distributed environment management, (e) internet/intranet,
MA SECU NA RIT GE Y ME NT
lu Va tal dy To Stu
UE AL L V TION TA TO LUA EVA
COBIT
AUDITING
S SYSTEM Y UIT CONTIN ENT ASSESSM
PROCUREMENT / BESTSOURCIN G MANAGEMENT
CT G OJE PR EWIN VI RE
M CH AN A A N GE GE M EN T
MA
ITIL
CMMI
APPLICATION MANAGEME NT
IM
141
be used to help them understand EA better and focus on showing the outcome. It is necessary to leave the technical blueprints in the boiler room. Work on some easier areas that will meet less resistance from business owners to demonstrate quick wins and successes. EA is developed iteratively and evolves over time. Look at common areas and pick out three priority areas to focus on. Good governance is critical to the EA programme. The governance structure of an EA programme typically involves many stakeholder and working level committees. Leverage on existing committees and structures, where possible. Integrate EA into established forums for IT Governance within the organisation, if possible.
ICT deployment, and describes the positioning of the governance pieces as shown in Figure 7. The framework adopts a lifecycle approach positioning IT governance needs and concerns around the agencys long term IT vision. The tools, policies, and methodologies are also positioned in the overview so that agencies can understand how these aids can help them. It is structured as a three concentric-layered onion with the IT vision of the agency in the centre: 1. 2. The first layer consists of the four-lifecycle stages of plan, invest, deploy, and control. The second layer breaks this down into processes that an agency should consider for each stage. The third layer identifies the policies, methodologies, and tools that best serve the agency in addressing the processes.
3.
This framework helps chief information officers and IT managers to first understand the considerations necessary to achieve IT effectiveness. It then directs their attention toward the tools and policies that address the individual considerations. The agency starts in the plan stage of the framework and examines and establishes the alignment of ICT and business goals through strategic planning and other processes including enterprise architecture. All of these processes require long-term mapping and need to be done at the beginning stage of the lifecycle. With the plan for the next few years in place, the agency then moves to the invest, deploy, and control stages for its IT investments where there are other tools like IT portfolio management and risk management methodology to provide guidance. The positioning of enterprise architecture within this framework, which according to SloanMIT Research, form part of the IT governance equation (Weill & Ross, 2004). This will help agencies to better align IT