Top Banner
1 Architecture MIS 5003
32

Architecture

Jan 04, 2016

Download

Documents

amena-beach

Architecture. MIS 5003. Architecture. Components and the relationships among them. Program architecture Application architecture Enterprise system architecture. Program Architecture. A part of the system design process Define sub-programs Define program modules Define data stores - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Architecture

1

Architecture

MIS 5003

Page 2: Architecture

2

Architecture

Components and the relationships among them.

Program architectureApplication architectureEnterprise system architecture

Page 3: Architecture

3

Program Architecture

A part of the system design processDefine sub-programsDefine program modulesDefine data storesSpecify the calling sequences

e.g. System flow charts & Functional Hierarchy Diagrams

Page 4: Architecture

4

Application Architecture

Structure of a particular application.Databases and program componentsDevices and operating environments on

which these runCommunication links among the devices

Application architecture must take into account the enterprise architecture and its current load.

Page 5: Architecture

5

Enterprise Architecture

Structure of clients, servers, operating environments, networks and security used to support the enterprise applications.

Usually too expensive to be justified by a single application

Generally defines standards to which applications must adhere

Page 6: Architecture

6

What is Enterprise System Architecture?

Narrow - Hardware, Operating System and other System Software, DBMS & Network

Broad - Add: Application Programs, Design Tools, Physical Layout, Policies and Procedures

Page 7: Architecture

7

Principles for the Ideal Architecture

Open, High Performance/Cost Immediate AvailabilityInfinitely ScaleableCompletely Secure, Failure FreeInexpensive, Rapid ChangeHigh Level of User ControlLittle or no Training Required

Page 8: Architecture

8

The ISSUE for this Class

How does a person make “good” decisions in selecting architectures or components

Page 9: Architecture

9

Different Views

Business ViewReach, range, response & risk

Conceptual ViewNodes, application mix, performance

parameters & security planDesign View

Network design, server specifications, operating systems and middleware, program decomposition, segmentation and firewalls

Page 10: Architecture

10

Business View

Reach: locations for delivery

Range: application mix

Response: deferred, real time, interactive

Risk: threat*success*cost

Page 11: Architecture

11

Conceptual View

Translation of user needs into technical specifications.

Functionality at each nodeData and process demands for the

systemDialog expectations and processing

turnaround needsSecurity objectives

Page 12: Architecture

12

Design View

Distribution of functions across nodesLocation of data and access proceduresNode specifications (or specifications of

existing nodes)Location of firewalls and use of added

security such as encryptionLink specifications and interconnection

design

Page 13: Architecture

13

Base Architecture

Mainframes -- few new applications; used mostly for legacy ones

Client/Server -- most new applications; main direction for next several years

NetCentric -- important new area; will it take over some or all

Combinations -- case for most systems

Page 14: Architecture

14

Mainframe Architecture -- 1990

Proprietary $100,000/MIPSYears to DeliverDifficult to ScaleChange DifficultRemote Users Works Well!

Page 15: Architecture

15

Mainframe Architecture in 2000

$2,000 per MIPSOpen architectureNow a Network Server as wellShort Delivery time Excellent operating systems &

supportIncreased scalabilityLarge set of existing programs

Page 16: Architecture

16

Distributed System Characteristics - 1999

Open, <$100/MIPSShort AvailabilityGood ScalabilityMore User ControlMore Likely to FailCostly Training Costly to MaintainPolicy control Issue

Page 17: Architecture

17

Distributed Architectures

ServerServer

ClientClient

MainframeMainframeSystemsSystems

Stand AloneStand AlonePCPC

FatFatClientClient

ThinThinClientClient

Amount of WorkAmount of Work

Netcentric

Page 18: Architecture

18

TelecommunicationsEssential Link for Distributed

SystemsArea and Control

Local (LAN) - nearby, private Wide (WAN) - further away, public

Specifications - capacity or speedTechnology

Page 19: Architecture

19

NetCentric Systems

Intranets - Standard Browser & Protocol (TCP/IP)

Central Control of Intranet, some Applications, some Servers

Fast Approach to a Global System

Allows Local Autonomy

Page 20: Architecture

22

Electronic Commerce (EDI)

Issues: Cost, Elapsed Time, Access

Basic EDI-- electronic transactions, data flows, reports

Electronic markets and productsElectronic OutsourcingElectronic Virtual Firms

Page 21: Architecture

23

Electronic Commerce (B2C)

Issues: how do we use it.Reliability, accessibility, security.Electronic effects on traditional brick

and mortar business.Advertisement, electronic

registration, transaction processing, customer relationship management.

Page 22: Architecture

24

Broad Issues For Architectures

Business FunctionsCompany Preferences InteroperabilitySecurityReliability / AvailabilitySystem Management Tools Cost / Effectiveness

Page 23: Architecture

25

Company Culture

IS Priority of the Responsible ManagerPerceived Performance of Current IS Risk & Failure ToleranceChange ToleranceDesire to LeadExperience BaseSkills Base

Page 24: Architecture

26

Base Technologies I

High Performance/Cost, multi-chip Servers

Relational &/or Object DBMSFast, switched Ethernet, RoutersInternet II, faster, lower cost WANSElectronic signatures, high security

Page 25: Architecture

27

Base Technologies II

Multiple Architecture StructuresHigh Levels of CompetitionHigh Innovation RatesIncreasing Business and

Strategic Importance of IS Increasing IS visibility

Page 26: Architecture

28

Security in Distributed Systems

Passwords - one or multipleAuthenticationAccess Control ListsFirewallsEncryption & Electronic SignaturesSecurity Failure DetectionDamage Control and Correction

Page 27: Architecture

29

Availability Protection

Physical Control / ProtectionShadow Systems / LocationsMirror DatabasesRAID - Redundant Arrays of

Inexpensive DisksFault Tolerant ServersSystem Backups - Secure Storage

Page 28: Architecture

30

Vendors & Outsourcing

General Opinion -- consultants, other users, open literature

Direct Prior ExperiencesSpecifics-- Warranty Experience,

Customer Service, Response Time, Update Policy, Industry Position, Longevity

Page 29: Architecture

31

Future Forecasts

TechnologiesVendorsIS SkillsBusiness

FunctionsMarkets

You have no future!

CIO

Page 30: Architecture

32

Futures I

Multiple ArchitecturesWidespread Electronic CommerceIncreased Competition - Downsize,

Reorganize, Merge, FailSystem Design - Still Difficult,

Expensive and High Risk

Page 31: Architecture

33

Futures II

Continue New Technologies - Fast/Large everything, Voice, non-silicon processors/storage

Hardware Cost/Performance Telecommunications improvementsReduce labor cost - - CASE,

Package Programs, Outsourcing.

Page 32: Architecture

34

Technology Assessment

Winning technologies generally have:Low costEarly introductionGood enough performanceMarket share

Most technology innovations have evolved into one or two dominant products over time.