Top Banner
1 Architecture MIS 5003
32

C13Architecture.ppt

Feb 14, 2017

Download

Technology

Aamir97
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: C13Architecture.ppt

1

ArchitectureMIS 5003

Page 2: C13Architecture.ppt

2

Architecture

Components and the relationships among them.

Program architectureApplication architectureEnterprise system architecture

Page 3: C13Architecture.ppt

3

Program Architecture

A part of the system design processDefine sub-programsDefine program modulesDefine data storesSpecify the calling sequences

e.g. System flow charts & Functional Hierarchy Diagrams

Page 4: C13Architecture.ppt

4

Application Architecture

Structure of a particular application.Databases and program componentsDevices and operating environments on

which these runCommunication links among the devices

Application architecture must take into account the enterprise architecture and its current load.

Page 5: C13Architecture.ppt

5

Enterprise Architecture

Structure of clients, servers, operating environments, networks and security used to support the enterprise applications.

Usually too expensive to be justified by a single application

Generally defines standards to which applications must adhere

Page 6: C13Architecture.ppt

6

What is Enterprise System Architecture?Narrow - Hardware, Operating

System and other System Software, DBMS & Network

Broad - Add: Application Programs, Design Tools, Physical Layout, Policies and Procedures

Page 7: C13Architecture.ppt

7

Principles for the Ideal ArchitectureOpen, High Performance/Cost Immediate AvailabilityInfinitely ScaleableCompletely Secure, Failure FreeInexpensive, Rapid ChangeHigh Level of User ControlLittle or no Training Required

Page 8: C13Architecture.ppt

8

The ISSUE for this Class

How does a person make “good” decisions in selecting architectures or components

Page 9: C13Architecture.ppt

9

Different ViewsBusiness View

Reach, range, response & riskConceptual View

Nodes, application mix, performance parameters & security plan

Design ViewNetwork design, server specifications,

operating systems and middleware, program decomposition, segmentation and firewalls

Page 10: C13Architecture.ppt

10

Business ViewReach: locations for

deliveryRange: application

mixResponse: deferred,

real time, interactiveRisk:

threat*success*cost

Page 11: C13Architecture.ppt

11

Conceptual View

Translation of user needs into technical specifications.

Functionality at each nodeData and process demands for the

systemDialog expectations and processing

turnaround needsSecurity objectives

Page 12: C13Architecture.ppt

12

Design ViewDistribution of functions across nodesLocation of data and access proceduresNode specifications (or specifications of

existing nodes)Location of firewalls and use of added

security such as encryptionLink specifications and interconnection

design

Page 13: C13Architecture.ppt

13

Base Architecture

Mainframes -- few new applications; used mostly for legacy ones

Client/Server -- most new applications; main direction for next several years

NetCentric -- important new area; will it take over some or all

Combinations -- case for most systems

Page 14: C13Architecture.ppt

14

Mainframe Architecture -- 1990Proprietary $100,000/MIPSYears to DeliverDifficult to ScaleChange DifficultRemote Users Works Well!

Page 15: C13Architecture.ppt

15

Mainframe Architecture in 2000

$2,000 per MIPSOpen architectureNow a Network Server as wellShort Delivery time Excellent operating systems &

supportIncreased scalabilityLarge set of existing programs

Page 16: C13Architecture.ppt

16

Distributed System Characteristics - 1999Open, <$100/MIPSShort AvailabilityGood ScalabilityMore User ControlMore Likely to FailCostly Training Costly to MaintainPolicy control Issue

Page 17: C13Architecture.ppt

17

Distributed Architectures

ServerServer

ClientClient

MainframeMainframeSystemsSystems

Stand AloneStand AlonePCPC

FatFatClientClient

ThinThinClientClient

Amount of WorkAmount of Work

Netcentric

Page 18: C13Architecture.ppt

18

TelecommunicationsEssential Link for Distributed

SystemsArea and Control

Local (LAN) - nearby, private Wide (WAN) - further away, public

Specifications - capacity or speedTechnology

Page 19: C13Architecture.ppt

19

NetCentric Systems

Intranets - Standard Browser & Protocol (TCP/IP)

Central Control of Intranet, some Applications, some Servers

Fast Approach to a Global SystemAllows Local Autonomy

Page 20: C13Architecture.ppt

22

Electronic Commerce (EDI)

Issues: Cost, Elapsed Time, AccessBasic EDI-- electronic transactions,

data flows, reportsElectronic markets and productsElectronic OutsourcingElectronic Virtual Firms

Page 21: C13Architecture.ppt

23

Electronic Commerce (B2C)Issues: how do we use it.Reliability, accessibility, security.Electronic effects on traditional brick

and mortar business.Advertisement, electronic

registration, transaction processing, customer relationship management.

Page 22: C13Architecture.ppt

24

Broad Issues For Architectures

Business FunctionsCompany Preferences InteroperabilitySecurityReliability / AvailabilitySystem Management Tools Cost / Effectiveness

Page 23: C13Architecture.ppt

25

Company Culture

IS Priority of the Responsible ManagerPerceived Performance of Current IS Risk & Failure ToleranceChange ToleranceDesire to LeadExperience BaseSkills Base

Page 24: C13Architecture.ppt

26

Base Technologies I

High Performance/Cost, multi-chip Servers

Relational &/or Object DBMSFast, switched Ethernet, RoutersInternet II, faster, lower cost WANSElectronic signatures, high security

Page 25: C13Architecture.ppt

27

Base Technologies II

Multiple Architecture StructuresHigh Levels of CompetitionHigh Innovation RatesIncreasing Business and

Strategic Importance of IS Increasing IS visibility

Page 26: C13Architecture.ppt

28

Security in Distributed SystemsPasswords - one or multipleAuthenticationAccess Control ListsFirewallsEncryption & Electronic SignaturesSecurity Failure DetectionDamage Control and Correction

Page 27: C13Architecture.ppt

29

Availability ProtectionPhysical Control / ProtectionShadow Systems / LocationsMirror DatabasesRAID - Redundant Arrays of

Inexpensive DisksFault Tolerant ServersSystem Backups - Secure Storage

Page 28: C13Architecture.ppt

30

Vendors & Outsourcing

General Opinion -- consultants, other users, open literature

Direct Prior ExperiencesSpecifics-- Warranty Experience,

Customer Service, Response Time, Update Policy, Industry Position, Longevity

Page 29: C13Architecture.ppt

31

Future ForecastsTechnologiesVendorsIS SkillsBusiness

FunctionsMarkets

You have no future!

CIO

Page 30: C13Architecture.ppt

32

Futures I

Multiple ArchitecturesWidespread Electronic CommerceIncreased Competition - Downsize,

Reorganize, Merge, FailSystem Design - Still Difficult,

Expensive and High Risk

Page 31: C13Architecture.ppt

33

Futures IIContinue New Technologies -

Fast/Large everything, Voice, non-silicon processors/storage

Hardware Cost/Performance Telecommunications improvementsReduce labor cost - - CASE,

Package Programs, Outsourcing.

Page 32: C13Architecture.ppt

34

Technology Assessment

Winning technologies generally have:Low costEarly introductionGood enough performanceMarket share

Most technology innovations have evolved into one or two dominant products over time.