enterprise colaboraton architecture
TRANSCRIPT
MDA & SOA in the Enterprise
VCAMDASOA/ESB
Applying Model Driven Architecture (MDA) to Services Oriented Architecture (SOA) to enable the
Executable Enterprise
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise MDA
The BusinessProcesses, Information, Requirements, Structure
Model OfMDA Viewpoint
The CIMBusiness Model
The Information SystemApplication ComponentsServing Business Needs
The PIMApplication Component Model
The PSMTechnology Model
Technology How specific technologiesWill implement application
Components
Specifies
Case Study
U.S. General Services Administration (GSA)
Customer: GSA OCIO
Provider: LMI & Data Access Technologies
Tooling: Component-X, Magicdraw UML, OsEra
Sections reproduced with the permission of the GSA – George Thomas
Copyright © 2000-2005, Data Access Technologies, Inc.
“Sea Change”Sea of change
Get-it-right (Initiative for better acquisition)Merger of FTS/FSS (Major Internal Organizations)Restructuring to provide a unified face to the customerOMB and Congressional mandates and changes of missionIntegrating and modernizing financial managementReduction of redundant processes and systems
ImplicationsMassive organizational changeMassive system changesRetraining staffHigh cost of changeRisky and hard to achieveChange combined with current costs and inefficiencies of redundant stovepipe systems is not practical
Copyright © 2000-2005, Data Access Technologies, Inc.
“Sea Change” Enablers & Cost Reduction
Value Chain AnalysisAnalyzing and restructuring business processes based on realized customer value
Model Driven Executable ArchitectureExecutable enterprise architecture to realize business goals with systems and workflow automation
Business Service Oriented Architecture / ESBAn enterprise modernization strategy supporting business services, integration, reuse and common components across a system of systems integrated with SOA/ESB
Combined effect of more automated processes
Being able to realize your business goals – priceless!
Copyright © 2000-2005, Data Access Technologies, Inc.
Tactical Goals
Replacement of outdated systemsImprove business processesPosition to become a government wide service“Get to green” (OMB Requirements for architectural maturity)
Copyright © 2000-2005, Data Access Technologies, Inc.
One-GSA Initiative
Stovepipes
PBS
FTS
FSS
H.R.Finance
Marketing
SchedulesBuildings
I.T.Telecom
s
One-GSASolutions
Auto
Supplies
Un-Architected Solution Architected Solution
Copyright © 2000-2005, Data Access Technologies, Inc.
Acquisition Model Today
FSS
FTS
PBS
Solution Provider
Finance
Acquisition system
Solution Provider
Solution Provider
Finance
Finance
Acquisition system
Acquisition system
GS
A
GS
A
Suppli
es
Space lease
IT ServicesCustomer Needs
Customer Solutions
Copyright © 2000-2005, Data Access Technologies, Inc.
To Be Acquisition Model
Contracting
Finance
Project Management
Solution Provider
Solution Provider
GS
A
GS
A
Vendor Solution
Customer Needs
Copyright © 2000-2005, Data Access Technologies, Inc.
System + Investment cost over 6 years
0
20
40
60
80
100
120
140
160
Year 1 Year 2 Year 3 Year 4 Year 5 Year 6
BaselineOption BOption C
Note: Representative Numbers Est. NPV Break Even – About 6 Years
Business Advantage Savings Not Included
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise Service Bus to Enable Target State
Services driven from the business modelReusable Enterprise Services
are independent & easily adapted and interconnected
Services communicate with each other like humans do with email
Information systems become a lattice of cooperating servicesCIO to Provide an “Enterprise Service Bus” using commercial standards
Industry best practice to avoid developing large monolithic applications
One-GSA Business Model
FundsManagementService
ContractingService
Solution ProviderService
ProjectManagementService
Enterp
rise S
ervice
s
Copyright © 2000-2005, Data Access Technologies, Inc.
Legacy “Wrapping”Legacy “Wrapping”
Wrapping allows existing programsWrapping allows existing programsand data to work with and workand data to work with and workas enterprise components.as enterprise components.Legacy systems are wrapped asLegacy systems are wrapped asa set of services.a set of services.
AdaptersAdvantage
EnterpriseServices
PurchasingServices
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise Systems Modernization Strategy
Identify components that will offer greatest ROICreate target executable model⌧OneGSA enterprise model is baseline
Identify system of systems to consider for targetPick an alternative for each;
• Evolve one or more current systems to support target processes, take on new capabilities and support One-GSA interfaces and/or
• Harvest one or more systems to build a replacement and/or• Integrate functionality into shared services as common components and/or• Replace systems or parts of systems that are no longer suitable.
Model driven SOA provides the flexibility to mix and match approaches as required. Commonality where possible – diversity where necessary. Evolving over time from integration to common components.End result – architected system of systems
Copyright © 2000-2005, Data Access Technologies, Inc.
Systems to Role Based Service Components
SystemSystem
SystemSystemSystemSystem
SystemSystemSystemSystemSystemSystem
Copyright © 2000-2005, Data Access Technologies, Inc.
Transition by role, not system
System
System
System
System System
SystemSystem
System
System
RoleRole
Role
Role
Role
Role
Role
Role
Role
Role
EnterpriseService
Bus
Still Theory
Copyright © 2000-2005, Data Access Technologies, Inc.
Consolidation into Service Components
The GoodStrategic reduction in operating cost – up to 50%Agile business processesUnification of the enterpriseOnly way to achieve enterprise transition?
The BadInvestment in change – As high as 25%Legacy and packaged systems are not componentized
The UglyChange is expensive and can be disruptiveCurrent boundaries and ownership change – may require centralized authority and budgetingRequires more “enterprise” agreement – very difficult to get consensus
Copyright © 2000-2005, Data Access Technologies, Inc.
Strategic Migration
Separate and Non-Interoperable Applications
Ad Hoc Point to Point Integration of Monolithic Systems
Systems Composed of Interoperable Components
Standards based integration of Monolithic Systems
Executable Enterprise Architecture Drives Agile Systems of Systems using Interoperable Components
•Are you here?
Target State
Copyright © 2000-2005, Data Access Technologies, Inc.
MDA Enhanced Procurement Current Strategic
AnalyzeRequirements against
or Create BA
Solution
MDA EnterpriseArchitecture
Elaborate Components
Service ComponentReuse Library
ComponentComponentGenerate
AdaptConstruct
SC IntegrationTesting
Fund/ContractFund/ContractFund/ContractReuse
Order &Requirements
Fund/Contract
Solution
ContractorDesign
ImplementTest
Copyright © 2000-2005, Data Access Technologies, Inc.
EA Governance Structure
One GSA Target EA
OMB - 300Initiative
EA Governance
Acquisition
Business Drivers
•Guides
•Refines
Specifies
•Satisfies
Copyright © 2000-2005, Data Access Technologies, Inc.
“One GSA” EA Strategic Integration
The “One GSA” EARepository
IT Capital Planning and Investment
Control
PerformanceManagement
Process
Human CapitalPlanning
GSAStrategic
Plan
•The “One GSA” EA aligns with:GSA Strategic Plan
IT Capital Planning and Investment Control process
Human Capital Planning process
Performance Management process
Competitive SourcingGovernance
EA is a STRATEGIC ASSET
Competitive Sourcing
The “One GSA” EA repository houses models and artifacts that have been vetted and agreed to.
Enterprise MDA
An approach to realizing executable enterprise architecture with MDA and SOA
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise MDA
Architecture at the Enterprise LevelSystems of systemsCollaboration of organizations, systems & peopleWide-scale collaborative processes ⌧roles and responsibilities
Business Service Oriented ArchitectureEnterprise ComponentsComponentizing functionality – not creating itExecutable processes – smooth transition from model to simulation to solution
Executable Enterprise Architecture
Copyright © 2000-2005, Data Access Technologies, Inc.
The OMG-Enterprise Collaboration Architecture
ECA is a “profile of UML”, a way to use UML for a specific purpose - it is an OMG standard
That purpose is modeling enterprise systems.You can also think of this as a “modeling framework” for enterprise computingECA is part of the “Model Driven Architecture” (MDA) initiative of the OMG
Using precise modeling techniques as part of the development lifecycle to speed development and provide technology independence
ECA has been adopted by the OMG as part of the EDOC Profile for UML specification.
Copyright © 2000-2005, Data Access Technologies, Inc.
Value Focused Target Architecture
One GSA Target EA
Time LineTrends
Critical Success Factors
Time LineTrends
Critical Success Factors
ProjectsProjects
Business ModelsBusiness Models
WorkflowWorkflow
I.T. Systems SpecsI.T. Systems Specs
Collaborative EnvironmentCollaborative Environment
Documentation &TrainingDocumentation &Training
Business DriversBusiness Drivers
Current ProcessesCurrent Processes
FARFAR
Current EnvironmentCurrent Environment
TrendsTrends
InitiativesInitiatives
Copyright © 2000-2005, Data Access Technologies, Inc.
SimulatedModel Driven Architecture
DomainArchitecture
SimulatorSimulator
EnterpriseEnterpriseArchitecture Architecture
ModelModel(CIM)(CIM)
Live Process Simulation
Refine/Iterate
ECA Standard“Meta-Model”& UML Profile
Copyright © 2000-2005, Data Access Technologies, Inc.
AutomatedModel Driven Architecture
MetaMeta--ModelModelUML ProfileUML Profile(E.G. ECA)(E.G. ECA)
DomainArchitecture
Framework &Framework &InfrastructureInfrastructure
(E.G. (E.G. --J2EEJ2EE--WS)WS)PSMPSM
InfrastructureInfrastructureMappingMapping
(E.G. J2EE(E.G. J2EE--WS)WS)
Mapping is tunedMapping is tunedto the infrastructureto the infrastructure
ToolsToolsProduce &Produce &IntegrateIntegrate
EnterpriseEnterpriseComponentsComponents
Enterprise Enterprise Architecture Architecture Model (CIM)Model (CIM)
Minimize and structuremanual implementation
C
TechnicalArchitecture
Copyright © 2000-2005, Data Access Technologies, Inc.
AutomatedModel Driven Architecture
MetaMeta--ModelModelUML ProfileUML Profile(E.G. ECA)(E.G. ECA)
DomainArchitecture
Framework &Framework &InfrastructureInfrastructure
(E.G. (E.G. --J2EEJ2EE--WS)WS)PSMPSM
InfrastructureInfrastructureMappingMapping
(E.G. J2EE(E.G. J2EE--WS)WS)
Mapping is tunedMapping is tunedto the infrastructureto the infrastructure
ToolsToolsProduce &Produce &IntegrateIntegrate
J2EEJ2EE--WSWSEnterpriseEnterprise
ComponentsComponents
Enterprise Enterprise Architecture Architecture Model (CIM)Model (CIM)
Multiple and Changing Technology Support
C
TechnArchite
SimulationSimulationInfrastructureInfrastructure
TeArc
SimulatedSimulatedEnterpriseEnterprise
ComponentsComponentsC
InfrastructureInfrastructureMappingMapping
(E.G. .NET(E.G. .NET--WS)WS)
C
Copyright © 2000-2005, Data Access Technologies, Inc.
Copyright © 2000-2005, Data Access Technologies, Inc.
The Connected EnterpriseContent and Communication
AerialPhotos
DigitalMap
CensusData
HouseDrawings
PoliceRecords
PoliceDispatcher
Role
Copyright © 2000-2005, Data Access Technologies, Inc.
Multiple roles in a collaboration
Copyright © 2000-2005, Data Access Technologies, Inc.
Travel Expense Example
1: travelPermissionRequest2: travelPermission
3: expenseReport
4: authorizedExpenseReport
5: paymentRequest
Peter(Technical author)
Bill(Dispatcher)
Joyce(Sales clerk)
Douglas(Marketing manager)
Kim(Methodologist)
Elsie(Programmer)
Eve(Software Manager)
Bill(Bookkeeper)
Joe(Paymaster)
Adam(Chief Accountant)
Ruth(President)
John(Cashier)
Ann(Customer consultant)
Copyright © 2000-2005, Data Access Technologies, Inc.
DiagramTravel Expense Model
Peter(Technical author)
Bill(Dispatcher)
Joyce(Sales clerk)
Douglas(Marketing manager)
Kim(Methodologist)
Elsie(Programmer)
Eve(Software Manager)
Bill(Bookkeeper)
Joe(Paymaster)
Adam(Chief Accountant)
Ruth(President)
John(Cashier)
Ann(Customer consultant)
/ Paymaster
/ BookKeeper / Traveler
/ Authorizer
Objects --> ClassifierRoles
Copyright © 2000-2005, Data Access Technologies, Inc.
Collaboration Diagram
Traveler Authorizer Book Keeper
Paymaster
Copyright © 2000-2005, Data Access Technologies, Inc.
The Marketplace Example
Mechanics Are UsBuyer
Acme IndustriesSeller
Order
Conformation
Ship Req
Shipped
Shipped
PhysicalDelivery
Delivered
Status
ProcessComplete
GetItThere FreightShipper
Copyright © 2000-2005, Data Access Technologies, Inc.
Where are the services?
Mechanics Are UsBuyer
Acme IndustriesSeller
Order
Conformation
Ship Req
Shipped
Shipped
PhysicalDelivery
Delivered
Status
WebService
WebService
WebService Web
Service
WebService
GetItThere FreightShipper
Copyright © 2000-2005, Data Access Technologies, Inc.
Inside the Seller
Order
Conformation
Shipped
Ship Req
Shipped
Delivered
Order Processing
Shipping
Receivables
Event
WebService
WebService
WebService
WebService
WebService
WebService
WebService
WebService
Copyright © 2000-2005, Data Access Technologies, Inc.
Roles to Systems
Implementation
Net
Hardware
OperatingSystem
Framework,Middleware& Container
Interaction Path
Component in Role
Interaction(With Information)
Role
Collaboration
Model to Integrate
From business needs to executing solutions
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise MDA ProcessComputation Independent Model (CIM)Computation Independent Model (CIM)
Platform Independent Model (PIM)Platform Independent Model (PIM)
Platform Specific Model (PSM)Platform Specific Model (PSM)
Plan and Design Develop and Deliver
ProvideAfter Care
Mission-Critical Value Chain
Plan and Design Develop and Deliver
ProvideAfter Care
Mission-Critical Value Chain
Value Chains Roles andCollaboration
Information ModelBusiness Context
Service-Oriented Architecture
Data Model
<wsdl:porttype>…
</wsdl:porttype> Web Services
EA Report
Components
Business Case
Sequencing Plan
•Open Source eGov ReferenceArchitecture
•Stakeholders•Business Drivers•As-Is Business Processes
•As-Is Systems
Change Management, Configuration Management, and Communications Change Management, Configuration Management, and Communications
Program Management and Risk Assessment/MitigationProgram Management and Risk Assessment/Mitigation
Copyright © 2000-2005, Data Access Technologies, Inc.
Value Chains
Support Services Value Chains
Marketing
Development of Government-wide Policy
Shared Services Value Chains
Acquisition
I.T. Services
Financial Management Services
Human Capital Services
Plan and Design Develop and Deliver
ProvideAfter Care
Mission-Critical Value Chain
Support Services Value Chains
Marketing
Development of Government-wide Policy
Shared Services Value Chains
Acquisition
I.T. Services
Financial Management Services
Human Capital Services
Plan and Design Develop and Deliver
ProvideAfter Care
Mission-Critical Value Chain
Copyright © 2000-2005, Data Access Technologies, Inc.
Disciplines – Areas of Responsibility
Financial Management
Policy
Acquisition
Human Resources Marketing
Property ManagementSolutions
Business Intelligence
Copyright © 2000-2005, Data Access Technologies, Inc.
Collaborative Process Model
Enterprise Role. A major area of functional responsibility within the discipline of financial management.
Enterprise Role. A major area of functional responsibility within the discipline of financial management.
Work Role. A role responsible for a specific functional area within an enterprise role, such as might be assigned to a single worker or supported by an IT system.
Work Role. A role responsible for a specific functional area within an enterprise role, such as might be assigned to a single worker or supported by an IT system.
Activity. A specification of a business function in carried out the context of a work role.Activity. A specification of a business function in carried out the context of a work role.
Protocol. A defined conversation between two roles that may be extended over time. One role initiates and the other responds to the protocol, but information may flow both ways across the protocol.
Protocol. A defined conversation between two roles that may be extended over time. One role initiates and the other responds to the protocol, but information may flow both ways across the protocol.
Information Flow. An individual flow of information across a protocol or into or out of an activity.
Information Flow. An individual flow of information across a protocol or into or out of an activity.
Subactivity. A specification a subfunction within necessary to carry out an activity.Subactivity. A specification a subfunction within necessary to carry out an activity.
Copyright © 2000-2005, Data Access Technologies, Inc.
Receivables Management Example
Related to Customer Orders
Related to Receivables
Copyright © 2000-2005, Data Access Technologies, Inc.
Information Model Example
A term in the vocabulary represents a classof things to be described.
A term in the vocabulary represents a classof things to be described.
Attributes specify descriptive information having simple types.
Attributes specify descriptive information having simple types.
Entities may be described as having a unique identity.
Entities may be described as having a unique identity.
A relation between terms is described by an association between classes.
A relation between terms is described by an association between classes.
This means “zero or more”
This means “one or more”This indicates a compositional (as opposed to referential) association.
A class may be specialized into sub-classifications.
A class may be specialized into sub-classifications.
This is a constraint that defines the sub-classification.
An un-shaded class is further detailed on a different diagram.
Copyright © 2000-2005, Data Access Technologies, Inc.
Business (CIM) view -Collaborating Roles with Processes
Role
Role Role Role
ConversationProtocol
Copyright © 2000-2005, Data Access Technologies, Inc.
“Upper” PIM (system) View -Enterprise Component
RoleRole
Enterprise Component
“Rotate” to lookAt other aspectsof the component
People, organizationsAnd/or enterprise componentsplay roles in BusinessProcesses.
Copyright © 2000-2005, Data Access Technologies, Inc.
The “Enterprise Digital Assistant”
RoleEnterpriseComponent
Role
Components frequentlyhelp people play these roles
Enterprise components help peopleand organizations play roles
by automating and monitoringThe business process
From the system perspective.People and organizations
become part of the implementationOf the role
Components are the peoplesAutomated assistant
People, OrganizationsAnd systems play roles
BusinessProcess
People, organizations and systems
components work together to realize roles
Copyright © 2000-2005, Data Access Technologies, Inc.
People, Components & Organizations Collaborating
Role
RoleEnterpriseComponent
EnterpriseComponent
RoleEnterpriseComponent
Copyright © 2000-2005, Data Access Technologies, Inc.
EnterpriseComponent
EnterpriseComponent
“Lower” PIM View - Enterprise Component Internals
Containers
DBMS Data Managers
Adaptation Legacy Systems
EnterpriseComponent
UI Framework
Browser
Business Logic
UI Server Tier
UI Client Tier
Enterprise[Web] ServiceEnterprise
[Web] Service
Copyright © 2000-2005, Data Access Technologies, Inc.
PIM: Service-Oriented Component Architecture
Presentation Tier Application Tier Data Tier
Each Work Component in the PIM implements a Work Role from the CIM.
Each Work Component in the PIM implements a Work Role from the CIM.
Service Managers implement as system services the business services defined in the CIM.
Service Managers implement as system services the business services defined in the CIM.
Copyright © 2000-2005, Data Access Technologies, Inc.
Information ModelBusiness Transaction
Business Entity
Note; Not expecting anyoneTo really read this
Copyright © 2000-2005, Data Access Technologies, Inc.
MessagingMessage
Namesake
Note; Not expecting anyoneTo really read this
Copyright © 2000-2005, Data Access Technologies, Inc.
Persistence Model
Association indicates a reference to an entity persisted elsewhere.
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise Service Bus to Enable Target State
Services driven from the business modelReusable Enterprise Services are independent & easily adapted and interconnected
Services communicate with each other like humans do with email
Information systems become a lattice of cooperating components providing servicesSOA/Enterprise Service Bus using commercial standards
Industry best practice to avoid developing large monolithic applications
One-GSA Business Model
FundsManagementService
ContractingService
Solution ProviderService
ProjectManagementService
Enterp
rise S
ervice
s
Copyright © 2000-2005, Data Access Technologies, Inc.
Provisioning Model
Copyright © 2000-2005, Data Access Technologies, Inc.
Example of XML provisioned from model
<CustomerOrderEstablishment><Inter-Work-RoleTransaction>
<inter-work-roleTransactionID> … </inter-work…
</Inter-Work-RoleTransaction><newOrder>
<orderingCustomer><customerID> … </customerID>
</orderingCustomer><controllingSalesInstrument>
<salesInstrumentId> … </salesInstrumentId</controllingSalesInstrument><customerOrderAmount> … </customerOrderAmoun…<lineItems>
…</lineItems>
</newOrder></CustomerOrderEstablishment>
Note; Don’t have to really read this either!
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise Service Bus
* Complements of jBoss
Copyright © 2000-2005, Data Access Technologies, Inc.
Many BPEL Processes support the CIM
Copyright © 2000-2005, Data Access Technologies, Inc.
Copyright © 2000-2005, Data Access Technologies, Inc.
Common Environment for Intellectual Capital
Integration of infrastructure
Apl 1 CICS EJB .NET Cust Sys
MDA EnvironmentModels define the system
Value ChainModeling
MOFIntellectualCapital
UMLModeling
WorkflowTools
BusinessModeling
CollaborationModeling
Meta Object Facility “Meta Models”
Copyright © 2000-2005, Data Access Technologies, Inc.
Net Effect of Enterprise MDA
Clear path from needs to running technologyIntegrate business driven solutions with capital planning & the FEAInteroperable component architecture based on SOAIntegrate legacy, COTS, GOTS and new development into a coherent solutionStrategic evolutionReduced time, costs & risk
Copyright © 2000-2005, Data Access Technologies, Inc.
Business Model (CIM) Terminology
RoleA specification of the responsibility to perform specific functions in the context of a business process.Work roles may be nested in organizing enterprise roles.
ActivityA specification of a business function in the context of a role.Activities may be decomposed into subactivities.
ProtocolA defined conversation between two roles that may be extended over time (i.e., responses of one party to the other may not be immediate).One role initiates and the other responds to the protocol, but information may flow both ways across the protocol.
FlowAn atomic flow of information across a protocol or into or out of an activity.
Copyright © 2000-2005, Data Access Technologies, Inc.
Financial Management DisciplineEnterprise Role
Copyright © 2000-2005, Data Access Technologies, Inc.
Example: Receivables Accounting Work Roles
Protocol initiated outside Receivables Accounting
Protocol responded to outside Receivables Accounting
Protocol used internally within Receivables Accounting
Copyright © 2000-2005, Data Access Technologies, Inc.
Example: Billing Work RoleWork Role Protocol
ActivityFlow
Copyright © 2000-2005, Data Access Technologies, Inc.
Example: Establish Billing Activity
Copyright © 2000-2005, Data Access Technologies, Inc.
Typical Simple Protocol
The protocol is initiated by a requested transaction.The protocol is initiated by a requested transaction.
Responses to the transaction may indicate success or failure.Responses to the transaction may indicate success or failure.
Each accepted transaction effects a change in the information and behavior of the receiving role.
Each accepted transaction effects a change in the information and behavior of the receiving role.
Copyright © 2000-2005, Data Access Technologies, Inc.
Sample Billing Service Interfaces
Provided Interfaces Required Interfaces
One-GSA Methodology
A simple methodology for creating collaborative business processes
Copyright © 2000-2005, Data Access Technologies, Inc.
Basic Steps
Define business goals using Value Chain AnalysisRefine to high-level activitiesIdentify roles and organize roles into collaborationsDefine collaboration documentsCreate basic business transactionsOrganize into protocols and eventsUse protocols to define ports on rolesDrill-down into role detailUse model as basis for acquisitionAcquire/Implement rolesConfigure implementations for deployment with technology specificsDeploy
Copyright © 2000-2005, Data Access Technologies, Inc.
Copyright © 2000-2005, Data Access Technologies, Inc.
Order to Payment Process Informal Diagram
Notificationof Order
Completion
PaymentNotification
DeliverySchedule
Goods andServices
PurchaseOrder
AwardNotificationRFQs ow
Pegasys/Near
Order to Payment (Future State) - Involves only Purchases viaSchedules
Sup
plie
r:Fi
nanc
ial
Offi
cer
Sup
plie
r:C
ontra
ctO
ffice
r
FSS
:Fi
nanc
ial
Offi
cer
Info
rmat
ion
Con
tract
ing
Cus
tom
er:
Pro
ject
Man
ager
Sup
plie
r:P
roje
ct M
anag
erFS
S:O
rder
Man
ager
Sys
tem
sC
usto
mer
:Fi
nanc
ial
Offi
cer
Issue RFQ
Review RFQ
SubmitResponse
Conduct initialevaluation
eBuy (GUI interface)
Scheduleinformation(e-Library)
Processpurchase orders
Scheduledelivery ofgoods andservices
Accept Goods/Services
ProcessPayment
Dev elopPurchasing
Request (SOW,SLA, pricing,
timeline)
Adv antage DB
Customer financialsystems
Determine itemprice/
availability/contract
Notif ication oforder completion
Determineproject need for
products andservices
CombineProject
requirements
Conductresearch usinge-Library/eBuy
Record funding
Evaluatevendor
responses
Prepare Order
Obligate funds
Check orderstatus
ReceivePayment
Realize revenue
Close out order
Receive invoice
Funds
CustomerProcurement
Systems
Supplier Catalogs FSS-19
A B C D E
H
I JK L M N O P
A, F, I, L
E-Library
F
B, O
A, I,L
A, J A, D, J
A, J
A, J, L
A, J, L
B, E, O, S
A, D, G, M
A, E, L, M, S A, E, L, M, S
A, J, L
A, E, L, S
B, Q, S
B, C,T
B, D, Q, S
G, O, Q
Supplier FinancialSystems
G
Q
Bill Customer
R
I, R
S
Create Invoice
DevelopEvaluation
criteria/provideinput
ConductMarket
Research/Survey
Respond?Develop
response toRFQ
RFQ via eBuy
Yes
Responses via eBuy
Request review of responses
Answerquestions/
provide inputDistribute POs
POvia eBuyNo interest, Customer w ill
review other quotesNo
QuestionsAnswers
ReceivePurchaseOrders
Customer Invoice
Notif ication ofpayment received
Delivery Schedule
Receive RFQ
RFQ
RFQresponse
Review POs
POs
I
I
A, J
A, D, J
A, E, L, M, S
K A, D, G, P
D, G, M, P, Q D, G, M, P, Q
E, R, S
Inspect/Receivegoods andservices
B, C, N, P
DeliveryReceipt
T
DeliveryReceipt
ReceiveDeliverySchedule
B, C, N, P
Provideschedule
updates to FSSShip Goods
ReceiveDeliveryReceipt
Close outOrder
Goods/Services
Delivery Receipt
Payment orFunds Transfer
A, D, G, P A, D, G, N A, D, G, T A, D, G
Request fundavailability
Funding validated
DevelopAcquisition
Plan
CoordinateAcquisitionPlanning
Acquisition Plan Input
Receivepurchase
request datafrom PM
Assign contractspecialist
SOW
Evaluate PastPerformance
Aw ard Decision
Obligation
Monitor anddocument
performance
Close out order
A, K, L
Issue Aw ardNotices
Check orderstatus
B, C, SA, I, K,L
Final factfinding w ithsuppliers
VerifyFunds
Acceptance
ReceivePOs
POs via eBuy
Build RFQ
Market Research
Answerquestions/
provide input
Receivedeliveryschedule/updates
Receivedeliveryreceipts
Delivery scheduleupdates
Providecopy ofreceipt to
FSS
Delivery Receipts
Perform 3-w ayMatch
POs
Copyright © 2000-2005, Data Access Technologies, Inc.
Order to Payment Process DiagramOrder to Payment (Future State) - Involves only Purchases viaSchedules
Sup
plie
r:C
ontra
ctO
ffice
rC
ontra
ctin
gC
usto
mer
:P
roje
ct M
anag
erpl
ier:
Man
ager
Cus
tom
er:
Fina
ncia
l O
ffice
r
Issue RFQ
Review RFQ
SubmitResponse
Conduct initialevaluation
Dev elopPurchasing
Request (SOW,SLA, pricing,
timeline)
Determine itemprice/
availability/contract
Determineproject need for
products andservices
CombineProject
requirements
Conductresearch usinge-Library/eBuy
Record funding
Evaluatevendor
responses
A, F, I, L
B, O
A, I,L
A J A D J
A, J
A, J, L
A, J, LI, R
DevelopEvaluation
criteria/provideinput
ConductMarket
Research/Survey
Respond?Develop
response toRFQ
RFQ via eBuy
Yes
Responses via eBuy
Request review of responses
Answerquestions/
provide input
QuestionsAnswer
Receive RFQ
RFQ
RFQresponse
I
I
A, J
A D J
Request fundavailability
Funding validated
DevelopAcquisition
Plan
CoordinateAcquisitionPlanning
Acquisition Plan Input
Receivepurchase
request datafrom PM
Assign contractspecialist
SOW
EvaluatePerform
A, I, K,L
Final factfinding w ithsuppliers
Build RFQ
Market Research
Copyright © 2000-2005, Data Access Technologies, Inc.
Finding the Roles and Inner Roles
Customer Project ManagerCustomer Contracting
Customer Financial OfficerSupplier Financial OfficerSupplier Project Manager
Supplier Contracting OfficerFSS: Order ManagerFSS: Financial Officer
“Swim Lanes”
Order to Payment
Customer ProcurementBroker
Supplier
ProjectManager
ContractingOfficer
FinancialOfficer
ProjectManager
ContractingOfficer
FinancialOfficer
FinancialOfficer
OrderManager
RFQManager
CatalogManager
Roles in a Collaboration
Copyright © 2000-2005, Data Access Technologies, Inc.
High-level role identification
CustomerContracting
IndustryPartner
BusinessPlanning
CustomerLiaison
AccountManagement
User
CustomerFinance
OfferingLine
Management
OfferingManagement
CustomerStrategy
ProjectManagement
CustomerCare Accounting
CustomerContact
FundsManagement
Contracting
SolutionProvider
Source Selection Authority
Technical Management
Small Business Specialist
Legal Officer
Administrative Support
CustomerProgram
Management
IndustryPartner
AgencyCustomer GSA
Con
tract
ing
Team
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise Context
Simplified View - Level of detail is optional
Copyright © 2000-2005, Data Access Technologies, Inc.
Co-Managed Services Collaboration
Copyright © 2000-2005, Data Access Technologies, Inc.
Drilling Down into Customer Detail
Customer
ProjectManager
ContractingOfficer
FinancialOfficer
Copyright © 2000-2005, Data Access Technologies, Inc.
Choreography of Process
Copyright © 2000-2005, Data Access Technologies, Inc.
Sup
plie
r:C
ontra
ctO
ffice
rC
ontra
ctin
gC
usto
mer
:P
roje
ct M
anag
erS
uppl
ier:
Pro
ject
Man
ager
Cus
tom
er:
Fina
ncia
l Offi
cer
ProtocolsProtocols group RoleRole Interactions Interactions into Conversations
Interaction MessagesInteraction Messages
Copyright © 2000-2005, Data Access Technologies, Inc.
Create Business Transactions
Copyright © 2000-2005, Data Access Technologies, Inc.
Organize into protocols
Copyright © 2000-2005, Data Access Technologies, Inc.
Inner Protocols
Protocols represent conversations between rolesConversations frequently have sub-conversations, detail about a specific subjectThese sub-conversations are inner protocolsInner protocols can also be reused in other protocols or even as top-level protocolsProtocols can “nest” to any level of detail
Copyright © 2000-2005, Data Access Technologies, Inc.
Operations & Business Transactions
The highest level of interaction detail is specified as the flow of documents - business information.This can be as events or “business transactions”Business transactions are a “request/reply” that usually results in creating or satisfying some business commitment - it may take place over an extended timeWe specify abstract document types to represent the information that flows. Empty – “Abstract”
Copyright © 2000-2005, Data Access Technologies, Inc.
Modeling Collaboration Documents
Fill in details of the documentsFocus on business information -not technologyCollaboration - Not an information model May be derived from existing sourcesHelps in creating technology mappings - E.G. Web ServicesIncludes
CompositionTypeCardinality
Copyright © 2000-2005, Data Access Technologies, Inc.
Attach Protocols to Roles as “Ports”
Group transitions together into logical units
Copyright © 2000-2005, Data Access Technologies, Inc.
Detailed Information Flows
Inside the activities we can drill down to inner activities or detailed document flows -sending and receiving informationThis is used for the simulation, to validate the the model is correct and ultimately to test the implemented components.
Copyright © 2000-2005, Data Access Technologies, Inc.
Drill-down
Copyright © 2000-2005, Data Access Technologies, Inc.
Information ModelBusiness Transaction
Business Entity
Note; Not expecting anyoneTo really read this
Copyright © 2000-2005, Data Access Technologies, Inc.
MessagingMessage
Namesake
Note; Not expecting anyoneTo really read this
Copyright © 2000-2005, Data Access Technologies, Inc.
Persistence Model
Association indicates a reference to an entity persisted elsewhere.
Copyright © 2000-2005, Data Access Technologies, Inc.
Adding Data Managers
Entities are added to manage entity dataEntity Roles are managers that provides a view of the same identity in another contextThe Entities have ports for managing and accessing the entitiesNon-entities which are owned by (aggregate into) an entity are managed by the entity
+Street : Str+City : S+State : Str+Zip : Str
ingtring
inging
«EntityDatAddt
+Cust
1
+Adr
1..*
+Name : String+Balance : Decimal = 0+AccountNo : long
«EntityData»Account
+AccountNo : String
«Key»AccountKey
-.
1
-.
1
+Name : String-CompanyId : String
«EntityData»Company
+CompanyId : String
«Key»CompanyKey
-.
1
-.
1
.Manages
<<Entity>>CompanyManager
Manage
<<EntityRole>>AccountManager
Manage
-Manages1-.1
a»ress
Copyright © 2000-2005, Data Access Technologies, Inc.
Simulating the Process
Validation & Buy-inBusiness stakeholdersSMEsSystems Implementers
Copyright © 2000-2005, Data Access Technologies, Inc.
Initiating Activity
Copyright © 2000-2005, Data Access Technologies, Inc.
Activity interacting externaly
Copyright © 2000-2005, Data Access Technologies, Inc.
… With financial officer
Copyright © 2000-2005, Data Access Technologies, Inc.
Who records the funding
Copyright © 2000-2005, Data Access Technologies, Inc.
And the process returns to the PM
Copyright © 2000-2005, Data Access Technologies, Inc.
Add implementation
As component compositionsIn a programming languageBy using an external serviceBy Wrapping legacy systems
Copyright © 2000-2005, Data Access Technologies, Inc.
Enterprise Service Bus
Application Server (jBoss)BPEL EngineWeb ServicesSchemaJ2EE
Copyright © 2000-2005, Data Access Technologies, Inc.
Add technology specifics for deployment
Copyright © 2000-2005, Data Access Technologies, Inc.
Generated Web Service
Copyright © 2000-2005, Data Access Technologies, Inc.
Dealing with VariationMultiple Implementations of a Role
CustomerRole
(Logical)
DOL CustomerComponent
(Implementation)
DOI CustomerComponent
(Implementation)
Internal CustomerComponent
(Implementation)
The “Inside” can change as long as the external “contract” is satisfied
Architecture becomes part of Acquisition
Copyright © 2000-2005, Data Access Technologies, Inc.
ECA/CCA Implementation at GSA
Data Access TechnologiesMDA experts, developers of ComponentX, One GSA EA support⌧ enterprise-component.com
Creators/contributors to OMG EDOC/ECA/CCA open standards
ComponentXImplements ECA/CCA, used by GSA EAPMO to create collaborative role interaction modelsSupports ‘model to integrate’, combining design-time and run-time tools, with an extensible ‘component palette’Supports FEA Line of Sight via aspect orientation Supports ‘just in time’ model driven generated documentation
ComponentX is a J2EE applicationThe models are executable – they’re java programs!Web enabled simulations integrate with existing IT systems
Widely used EA tools (Mettis, Popkin, MS-Office) don’t compare!
Federal Enterprise Architecture
Support for the FEA as a view of the enterprise architecture
Copyright © 2000-2005, Data Access Technologies, Inc.
FEA (from reference)
Copyright © 2000-2005, Data Access Technologies, Inc.
FEA/ComponentX
Community Process Roles, processes, activities
Reference model associations via aspect/properties
Copyright © 2000-2005, Data Access Technologies, Inc.
B-P-A-A as ABM input
Copyright © 2000-2005, Data Access Technologies, Inc.
Iterative Development
BusinessModelDesign
DeployBuild Build Build Build Build ReleaseBuild
InfrastructureDevelopment
Automation
Generating Web Services & BPEL
Copyright © 2000-2005, Data Access Technologies, Inc.
PSM View - Mapping to [web] Services
Service Service
Service Service
One-wayService
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of a WSDL Engine
- <definitions xmlns="http://schemas.xmlsoap.org/wsdxmlns:soap="http://schemas.xmlsoap.org/wsdl/soapxmlns:mime="http://schemas.xmlsoap.org/wsdl/mimxmlns:http="http://schemas.xmlsoap.org/wsdl/http/ENC="http://schemas.xmlsoap.org/soap/encoding/xmlns:xs2000="http://www.w3.org/1999/XMLSchemxmlns:xs2001="http://www.w3.org/2001/XMLSchemtargetNamespace="urn:SellerServer" xmlns:tns="urn:Sxmlns:CoreTypes="urn:CoreTypes" xmlns:Ordering="urn
- <!--definitions obtained from component /BuySell/Deployment/Seller
AspectsWSDL
WSDL-SOAP
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of an Enterprise Component
- <service name="MySeller">
- <!--
implemented service role /BuySell/Deployment/SellerServer/MySeller -->
<documentation><p> </p></documentation>
- <port name="BuySellProtocol"binding="tns:BuySellProtocol">
- <!--
original service port was /BuySell/Deployment/SellerServer/MySeller/BuySellProtocol (extending Component </BuySell/SellerImplementation/MySeller/BuySellProtocol> ) -->
<soap:addresslocation="http://localhost:8080/cx/app/BuySell/Deployment/SellerServer/MySeller/BuySellProtocol" />
</port>
</service>
AspectsWSDL
WSDL-SOAP
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of a protocol binding
- <binding name="BuySellProtocol"type="tns:BuySellProtocol">
<soap:bindingtransport="http://schemas.xmlsoap.org/soap/hstyle="rpc" />
- <operation name="Order"><soap:operation
soapAction="urn:/BuySell/Community/BuySellPrcol/Order" style="rpc" />
- <input name="Order"><soap:body use="encoded" namespace="urn:SellerServ
encodingStyle="http://schemas.xmlsoap.org/soaencoding/" />
AspectsWSDL
WSDL-SOAP
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of a protocol
- <portType name="BuySellProtocol">
- <!--
original cx operation = /BuySell/Community/BuySellProtocol/Order -->
AspectsWSDL
WSDL-SOAP
- <operation name="Order">
- <!--
original cx flow port = /BuySell/Community/BuySellProtocol/Order/Order -->
<input name="Order" message="tns:Order" />
<output name="OrderConfirmation"message="tns:OrderConfirmation" />
<fault name="OrderDenied"message="tns:OrderDenied" />
</operation>
</portType>
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of message types
-
AspectsWSDL
WSDL-SOAP
- <message name="Order">
<part name="Order" type="Ordering:Order"
<message name="OrderConfirmation">
<part name="OrderConfirmation"type="Ordering:OrderConfirmation" />
</message> </message>
- <message name="OrderDenied">
<part name="OrderDenied"type="Ordering:OrderDenied" />
</message>
Copyright © 2000-2005, Data Access Technologies, Inc.
Mapping of data types
- <xs2001:complexType name="Order">
-
- <xs2001:sequence>
<xs2001:element minOccurs="1"maxOccurs="1" name="CompanyID"type="CoreTypes:CompanyID" />
<xs2001:element minOccurs="1"maxOccurs="1" name="OrderID"type="Ordering:OrderID" />
<xs2001:element minOccurs="0"maxOccurs="unbounded" name="Item"type="Ordering:Item" />
</xs2001:sequence>
</xs2001:complexType>
Copyright © 2000-2005, Data Access Technologies, Inc.
High level tooling & infrastructure
MUST BE SIMPLE!We must be able to create better applications faster We must separate the technology and business concerns, enable the user
Tooling + InfrastructureExecutable models are source codeTooling must be technology awareInfrastructure must support tooling, not manual techniques
Model based component architectures
Copyright © 2000-2005, Data Access Technologies, Inc.
High level tooling & infrastructure
MUST BE SIMPLE!We must be able to create better applications faster We must separate the technology and business concerns, enable the user
Tooling + InfrastructureExecutable models are source codeaTooling must be technology awareInfrastructure must support tooling
Model based component architectures
Executable Models
Copyright © 2000-2005, Data Access Technologies, Inc.
Net effect
Using these open standards and automated techniques we can;
80% Reduction in complexity (Conservative)Achieve the strategic advantage of an open and flexible enterpriseProduce and/or integrate these systems FASTER and CHEAPER than could be done with legacy techniquesProvide a lasting software asset that will outlive the technology of the day
Copyright © 2000-2005, Data Access Technologies, Inc.
Sample Applications
Financial Management Enterprise Architecture, andOne-GSA Executable Enterprise Architecture for the General Services Administration Enterprise Component Architecture for U.S. Army PEO-STRIIntelligence application for Raytheon & DARPACollaboration Architecture for Kaiser Permanente
Copyright © 2000-2005, Data Access Technologies, Inc.
Contact
Cory Casanave
Data Access Technologies
www.enterprisecomponent.com