What is a Service Oriented
Architecture?
1
Problems Addressed by a Service Oriented Architecture
2
What is a Service Oriented Architecture (SOA)?
A method of design, deployment, and management of
both applications and the software infrastructure
where:
All software is organized into business services that
are network accessible and executable.
Service interfaces are based on public standards for
interoperability.
3
Key Characteristics of SOA
Quality of service, security and performance are
specified.
Software infrastructure is responsible for managing.
Services are cataloged and discoverable.
Data are cataloged and discoverable.
Protocols use only industry standards.
4
What is a Service?
A Service is a reusable component.
A Service changes business data from one state to
another.
A Service is the only way how data is accessed.
If you can describe a component in WSDL, it is a
Service.
5
Information Technology is Not SOA
Business Mission
Information Management
SOA Information Systems
Systems Design
Informatio
Computing & Communications n
Technolog
y
6
Why Getting SOA Will be Difficult
Managing for Projects:
Software: 1 - 4 years
Hardware: 3 - 5 years;
Communications: 1 - 3 years;
Project Managers: 2 - 4 years;
Reliable funding: 1 - 4 years;
User turnover: 30%/year;
Security risks: 1 minute or less.
Managing for SOA:
Data: forever.
Infrastructure: 10+ years.
7
Why Managing Business Systems is Difficult?
40 Million lines of code in Windows XP is
unknowable.
Testing application (3 Million lines) requires >1015
tests.
Probability correct data entry for a supply item is
<65%.
There are >100 formats that identify a person in DoD.
Output / Office Worker: >30 e-messages /day.
8
How to View Organizing for SOA
Private Applications and Files PERSONAL LEVEL
Privacy and
Individual
Security Barrier VARIETY HERE
Graphic InfoWindow, Personal Tools, Inquiry Languages
Customized Applications, Prototyping Tools, Local LOCAL LEVEL
Applications and Files
Applications
Security Barrier
Applications Development & Maintenance APPLICATION LEVEL
Business
Security Barrier
Service A Service B OSD BUSINESS LEVEL
Process
Security Barrier
Functional Process A
Functional Process B
Functional Process C PROCESS LEVEL
Functional Process D
Corporate Policy, Corporate Standards, Reference Models,
Data Management and Tools, Integrated Systems
Configuration Data Base, Shared Computing and ENTERPRISE LEVEL
Telecommunications
STABILITY HERE
Industry Standards, Commercial Off-the-Shelf
Products and Services GLOBAL LEVEL
9
SOA Must Reflect Timing
Private Applications and Files PERSONAL
Graphic InfoWindow, Personal Tools, Inquiry Languages
Customized Applications, Prototyping Tools, Local
LOCAL SHORT TERM
Applications and Files
ADAPTABILITY &
TECHNOLOGY
Applications Development & Maintenance
APPLICATION SIMPLICITY
Infrastructure
Business A Business B Support BUSINESS
Functional Process A
Functional Process B
PROCESS
Functional Process C
Functional Process D
LONG TERM
Corporate Policy, Corporate Standards, Reference Models,
STABILITY &
Data Management and Tools, Integrated Systems
Configuration Data Base, Shared Computing and ENTERPRISE TECHNOLOGY
Telecommunications, Security and Survivability COMPLEXITY
Industry Standards, Commercial Off-the-Shelf
Products and Services
GLOBAL
10
Organization of Infrastructure Services
Infrastructure
Services
(Enterprise Information)
Data Security Computing Communication Application
Services Services Services Services Services
11
Organization of Data Services
Data
Services
Discovery Management Collaboration Interoperability Semantic
Services Services Services Services Services
12
Organization of Security Services
Security
Services
Transfer Protection Certification Systems Authentication
Services Services Services Assurance Services
13
A Few Key SOA Protocols
Universal Description, Discovery, and Integration, UDDI. Defines
the publication and discovery of web service implementations.
The Web Services Description Language, WSDL, is an XML-
based language that defines Web Services.
SOAP is the Service Oriented Architecture Protocol. It is a key
SOA in which a network node (the client) sends a request to
another node (the server).
The Lightweight Directory Access Protocol, or LDAP is protocol
for querying and modifying directory services.
Extract, Transform, and Load, ETL, is a process of moving data
from a legacy system and loading it into a SOA application.
14
Preservation of Assets is the Purpose of SOA
Data &
What the Customer Open Systems,
Systems Integration;
Trains to Apply; Equipment,
Communications
Applications Software,
Infrastructure
Usage Communications
Architecture
Short-term Obsolescent Long - term
Asset Commodity Asset Asset
(An Enterprise Function) (Outsource According to (An Enterprise Function)
Architecture)
>70% of Cost <10% of Cost
<20% of Cost
15
Impacts of Information Technologies
Information drives economic arms race.
Obsolete assets will be discarded.
Collaboration favors global consolidation.
I.T. becomes an economic weapon.
16