Architecture Methods, Elements and Standards required to achieve Boundaryless Information Flow™ Terence J. Blevins VP and CIO The Open Group 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA t.blevins@opengroup.org ABSTRACT: AbstractBoundaryless Information Flow is an expression used to suggest an end state where the information is made available to the right people at the right time and in the right format to take action in extended enterprises. To achieve Boundaryless Information Flow requires attention to specific architecture methods, the implementation of specific architecture elements, and specific use of standards in the creation of boundaryless infrastructure. To develop a boundaryless infrastructure an open enterprise architecture method is required. 1 INTRODUCTION 1.1 Preface The Boundaryless Information Flow [1] problem space is shared by many organizations. It is a problem space that can no longer be ignored. You can see the criticality of this problem space in other initiatives like Real-time where getting information to the right people at the right time is of paramount importance to operations of the mission and/or business. The Open Group [2] has accepted the challenge of doing its part to address this problem space. From a technical perspective we have developed a high-level reference model that depicts the major components to address this problem. This paper provides a description of the Boundaryless Information Flow Reference Model developed using TOGAF’s Architecture Development method that responds to the Boundaryless Information Flow problem. The model is documented as it stands today and is to be used as a vehicle for discussion so that the model can be refined as necessary. 1.2 Summary The Interoperable Enterprise Business Scenario [3] describes the needs driving our customers’ deployment of their own information infrastructure capability. The follow-up analysis of this work has resulted in the development of a Boundaryless Information Flow Reference Model aimed to address the Boundaryless Information Flow problem space. This paper describes the Boundaryless Information Flow Reference Model. The goal is to inform others of the intended meaning behind the graphic to engage in further discussion. Ultimately we will end up with a high level model that could be communicated widely and persist throughout the next few years as progress is made toward the Boundaryless Information Flow space. The Boundaryless Information Flow Reference Model provides insights related to customer needs for information infrastructure in enterprise environments. The Boundaryless Information Flow Reference Model also points to rules and standards to assist in leveraging solutions and products within the value chain. The following sections provide a brief discussion of the Boundaryless Information Flow Reference Model along with a description of the architecture method used to develop the model. 2 BOUNDARYLESS INFORMATION FLOW REFERENCE MODEL The reference model is a model of the major component categories for developing, managing, and operating an information infrastructure. It is a model of a set of applications that sit on top of an application platform. This reference model is now a subset of the TOGAF [4] TRM and it uses a different orienta- tion than the TRM. Consider Fig. 1 below where two views of the TOGAF TRM are presented. The side view is the typical view of the TOGAF TRM; where we are looking at the model as if we were looking at a house from the side revealing the contents of the floors. The top down view depicts what one might see if looking at a house from the roof down. Fig. 2: Focus of Boundaryless Information Flow Model The resulting Boundaryless Information Flow Reference Model is depicted in Fig. 3. It is fundamentally a reference model of application and application services software essential for an information infrastructure; it assumes the underlying existence of a computing and network platform, so they are not depicted in the model. Fig. 3 - Boundaryless Information Flow Model Fig. 1: TOGAF TRM Orientation Views The subset of the TRM that comprises the Boundaryless Information Flow Reference Model is depicted in Fig. 2 below. Here you see that we focus on the application, application platform, and qualities subset of the TOGAF TRM. The Boundaryless Information Flow Reference Model has the following core components: An application platform of services such as location and directory services, work flow services, data management services, data interchange services, etc… which provide the abilities to locate, access, and move information within the environment Information consumer applications which provide delivery of content to the user of the system, and the services to request access to information in the system Brokering applications which manage the requests from any number of clients to and across any number of service providers Information provider applications which provide response to client requests and provide rudimentary access to data managed by a particular server Development tools which provide all the necessary modeling, design, and construction tools to develop and deploy applications that require access to the integrated information in a manner consistent with the standards of the environment Management utilities which provide all the necessary utilities to understand, operate, tune, and manage the runtime system in order to meet the demands of an ever changing business in a manner consistent with the standards of the environment Interfaces that are used between the components. Interfaces include formats and protocols, application programming interfaces, switches, data values, etc. Following the TOGAF TRM, the applications are divided into two main categories: Business Applications and Infrastructure Applications. Information consumer, information provider, and brokering applications are all Business Applications. Development tools and Management utilities are all Infrastructure Applications. (There are more Business Applications and Infrastructure Applications than these, but the above are the subsets relevant to Boundaryless Information Flow.) The applications and application platform must adhere to the policies and requirements depicted by the qualities back plane. The following sections describe each of the runtime, development, and management elements of the reference model in further detail. ensure effective and consistent transfer of data between process activities, reducing manual re-entry errors and improving efficiency. Key to supporting applications are the services in the application platform that allow those applications to be focused on understanding and processing the information, in contrast to understanding the form, format, and/or location of the information required. Broker applications are now being built to serve up single requests that require access to multiple information sources. The brokerage applications break down the request, distribute the request to multiple information sources, collect the responses, and send a single response back to the requesting client. The following sections describe the application components of the Boundaryless Information Flow Reference Model. 3.1.1 Information Provider Applications Recognizing that information is today held hostage as depicted in the following figure, information provider applications are those applications that liberate data from their silos. 3 RUN-TIME ELEMENTS 3.1 Applications Information consumer, information provider, and brokering applications provide information brokerage, information access, and information update synchronization. These applications create an environment that provides a rich set of user services that transparently access heterogeneous systems, databases, and file systems. Applications are built on top of the services in the application platform provided in this model. The Boundaryless Information Flow Reference Model supports traditional applications as well as applications called Information Brokers, Information Consumers, and Information Providers. The services of application platform enable the maximum leverage of a single operational environment that provides transparency, to the extent possible, for fast and efficient development and deployment of the applications. The services of the application platform also Fig. 4: Need to Liberate Data Information provider applications address this by providing an open interface to a potentially proprietary silo interface. The following Fig. 5 depicts this where the interfaces on the left of the IPA are open interfaces and the interfaces between the IPA and silo data are proprietary interfaces. mation consumer applications with the security services depicted in the brick pattern. Fig. 5: Liberating the Data 3.1.2 Brokerage Applications Broker applications serve up single requests that require access to multiple information sources. The brokerage applications break down the request, distributes the request to multiple information sources, collect the responses, and send a single response back to the requesting client. Brokerage applications access information providers using the open standard interface provide by information providers and integrate information from multiple information providers and pass the information using open interfaces to information consumers. Brokerage applications also enable access to information within the enterprise by strategic partners. Fig. 6: Integrating data 3.1.3 Information Consumer Applications Information consumer applications provide information to the end user in a form they need it, when they need it, and in a secured manner. This includes providing the information in text, video, audio, English, German, … Information consumer applications communicate with information brokers or information providers using the available open interfaces of the brokerage applications or the information provider applications. Security is provided through the firewalls and or security services. Fig. 7 below depicts the infor- Fig. 7: Delivering Data 3.2 Application Platform Different types of application described above are built on top of the services provided by the Application Platform. The Application Platform component of the Boundaryless Information Flow Reference Model comprises a subset of all the services defined in the TOGAF Technical Reference Model, the subset that pertains to the services required to deliver Boundaryless Information Flow. Specifically, it comprises all those services in the TRM application platform that allow applications to focus on understanding and processing the information required, rather than understanding the form, format, and/or location of the information. The services of the Application Platform component can be used to support conventional applications as well as Brokerage, Information Consumer, and Information Provider applications. When used as part of an overall Applications Architecture in this way, such an approach enables maximum leverage of a single operational environment that is designed to ensure effective and consistent transfer of data between processes, and to support fast and efficient development, deployment and management of applications. The Application Platform component comprises the following categories of service. Software Engineering include: Languages Libraries and Registries Security services include: AAAC SSO Digital Signature Firewall Encryption Intrusion detection Identity Key Management Location and Directory services provide access facilities for name, location, description and relationship of data. Directory services are required to deploy a directory and to ensure that it is made available throughout the enterprise. The data in the directory is made available to all other components in the reference model. The following depicts the juxtaposition of location and directory services to the other components. Fig. 8: Registering the Location of Data Browser services Meta indices Portal and personalization services Data Interchange include: Information Format eForm services Instant messaging services Application messaging Application to application communications services Enterprise application integration Information access services provide the ability for an application to access an integrated view of data, regardless of whether the data exists in a mainframe system or in a distributed system. The information access services ensure that data integrity is maintained among multiple databases and also provide on-line data cleansing (which means that data is checked against data rules for each access.) Data Access Services provide open interfaces to legacy data, provide new applications standard database access services to vast amounts of existing data, and provide standard access services to new data types. Information and data access Transformation Mapping Query distribution Aggregation Search File services Additional services demand attention to enable the flow of information as depicted in the following figure. Location and directory services include services to: Access the directory Register Publish/Subscribe Discover Name Reference/Dereference Human Interaction Services provide the means to consistently present data to the end user in the appropriate format. The human interaction component of the Boundaryless Information Flow Reference Model provides services that assist in the formulation of customer data requests and enable visualization and presentation of the data accessed. Presentation Transformation Fig. 9: Workflow Services Enable Information Flow Workflow services enable process automation by facilitating user interactions and execution of appli- cations according to a process map. Workflow services supports the Boundaryless Information Flow Reference Model through enterprise integration of applications resulting in applications of extended value. Workflow services provide essential support for newer workflow processing, but also addresses the needs of managing an environment where legacy systems are prevalent. Specifically, Workflow services can become key enabling software for cleaning up data due to redundant data re-entry. Workflow services also provide a means to encapsulate existing applications thereby supporting the customer’s need for leverage of existing assets. 4.2 Business Modeling Tools 3.3 Qualities A rich tool set is provided to design, define and document the most pertinent information technology elements of the business based upon the business and business process rules. Examples of elements to be designed include, connections between people, organizations, workflows and computers; data and object models; physical data translation and translation rules; and constraints. Qualities are supported by quality of service services including the various services required to maintain the quality of the system as specified in service level agreements. Included in this are the services to post conditions and react to requests from the Quality of Service Manager. Additionally qualities are provided through tools and utilities. For example the following tools and utilities provide greater manageability and programmability. 4 DEVELOPMENT ELEMENTS 4.1 Development Tools The Development Tools component provides tools and a repository for the rules that govern the information needed for point of contact decisions, information required between process steps to reduce manual re-entry, integrity constraints between customer databases to reduce new dirty data, and to flag existing dirty data. The Development Tools provides tools for modeling, designing and construction. Specifically, tools are provided for business, process, and data modeling, as well as the traditional application construction tool set. The goal of this component is to transform the business model into software that automates the business processes revolving around information. Note that each set of tools will be logically connected through the Directory, allowing one tool to be driven by data from another. The following sections describe the requirements for components of Development Tools. Tools are provided for the modeling of business rules and business process rules. Business modeling describes and documents the business into a comprehensive knowledge base. It establishes a consensus among general management of the business direction, organization, processes, information requirements, and the current environment of the business. Perhaps most importantly, this understanding is documented in a common, business-oriented format to be utilized for subsequent enhancement. 4.3 Design Modeling Tools 4.4 Implementation and Construction Tools Implementation tools are required to enable timely development of reusable processes, applications and applications services. Such tools include intelligent browsers, data manipulation language compilers and optimizers, distributed application compilers and debuggers, heterogeneous client and server development tools, policy definition tools, and work flow script generation tools. 4.5 Deployment Tools Deployment tools are necessary to move implemented software from the development environment into the operational environment. 4.6 Libraries The Development Toolkit would not be complete without re-usable libraries of software that utilized the standards within the operational environment. 5 MANAGEMENT ELEMENTS 5.1 Management Utilities These utilities are for operations, administration and systems management, as well as utilities for the management of data based upon availability and cost requirements. The utilities provided by this domain execute in an attended or an unattended environment. 5.1.1 Operations, Administration and Management Utilities The OA&M component covers traditional systems management and administration utilities that manage business rules and information objects. Examples include utilities for installation, copyright and license management, and miscellaneous administration, configuration and registration functions. Additional utilities are required for the control of service billing, service triggering and account management. 5.1.2 Quality of Service Manager Utilities Including Health Monitoring and Management Utilities. ards are needed in some of the key areas depicted by the reference model. This is an incomplete list and should be used to stimulate further research. Please note that the search is for standard interfaces to services, not standard services. 6.1 Standards based Workflow The following are recommended areas where standards are required for Workflow services. Workflow service standard interfaces to access transactional workflows Workflow service standards for encoding workflow applications Workflow service standards for encoding and executing rule and constraint based workflows 6.2 Standards-based Information Access Services 5.1.3 Copy Management Utilities The copy management utilities within the Boundaryless Information Flow Reference Model ensure the maximum leverage of operational systems data by deploying tools that manage data movement from any given operational system to necessary distribution points in the enterprise. The distribution points support decisions at distribution points as needed. Also, the copy management utilities provide tools that detect and flag poor quality data. 5.1.4 Storage Management Utility A set of utilities is required to provide least-cost data storage management. Storage management utilities support the wide variety of storage mechanisms and are to be connected to file, object and database systems. Information access services are a part of the Boundaryless Information Flow Reference Model. Information access services require standardization the in following areas: Statistical information standards to support distributed query optimization Metadata exchange standards to support on-line dirty data detection and cleansing Data dictionary and repository access standards Heterogeneous database referential integrity encoding standards Encoding standards for “push” services Encoding standards for “pull” services Standard universal interface for information access to heterogeneous sets of information Standard interface to tag information for universal access 6.3 Standards-based Management 6 STANDARDS REQUIRED To address the Boundaryless Information Flow problem long-term open standards are required for the interfaces. Without open standard interfaces new silos will be created. Interfaces include invocation, formats, and protocols. Invocation standards include standard mechanisms to invoke a given service, e.g. programming interface, switches, shared memory, semaphores, … Formats standards include message formats, metadata, encodings, … Protocol standards include the known rules of processing that must be adhered to, for example TCP is a protocol specification. The following sections describe where open stand- The following are suggested areas where standards are needed, but the specific interfaces are not identified. These areas relate to information centric management tools for the economic management of the infrastructure. The standards should enable: A Boundaryless Information Flow Management Utility for enterprise processes, people, applications, objects, data and information in heterogeneous environment. Included are integration of legacy management capabilities and specific database backup, restore and recovery utilities. A set of Boundaryless Information Flow information copy management utilities that provide rules based information and data movement for heterogeneous environments. This utility ensures that data and information are available throughout the enterprise based upon the business rules driving the need for the access. Included is database replication management that provides performance, consistency and availability. Specific standards for data synchronization area required here. A Boundaryless Information Flow storage management utility that manages data and information storage based upon lowest cost per use. 6.4 Standards-based Development Environment A Standards-based Development Environment that complements the run-time also requires examination for standards. Development environment standards should enable: Enterprise-wide application reuse, management and control tools Common active directory and repository used for ADE and runtime, reusable objects,... Legacy application encapsulation and re-use tools Enterprise planning tools (strategies to technologies) Enterprise process management development tools Application mining tools to "discover" knowledge of existing applications Standards include: Enterprise modeling data interchange standards Directory standards for applications and libraries Standards for universal dynamic link libraries Binary application standards 6.5 Standards based Enterprise Visualization and Access An examination of the standards require to get information delivered to the “edge” is also required. The following lists likely areas to look for standardization of interfaces. Standard interfaces to support voice recognition services Standard interfaces to support text to speech and speech to text services Standard interfaces to support an interactive query interface environment Standard interfaces to support presentation (including 3D and 4D visualization) tools Standards for meta indices/meta data Standards for personalization preference encodings Naming services Discovery services Registration Services 6.7 Data Interchange Services Standards need to be selected for the following to support the ability for applications to communicate with other applications in a boundaryless environment: Application to application invocation interface Application to application information exchange formats and protocols 6.8 Security Services Standards need to be selected for the following to support the ability to secure the flow of information in a boundaryless environment: Identification and authentication services System entry control services Audit services Access control services Non-repudiation services Encryption services Digital signature services Key management services 6.9 International Operation Services Standards need to be selected for the following to support the ability to provide cost effective support of the international flavor in the boundaryless environment: Character sets and data representation services Cultural convention services Local language support services 6.10 Quality of Service To maintain quality of service in an extended enterprise standard interfaces are paramount. The following are likely areas to look for standardization of interfaces. Standard interfaces to report information about state, e.g. health, performance, etc Standard interfaces to communicate operational command requests Standard model to depict end-to-end quality of service 6.6 Location and Directory Services Standards need to be selected for the following to support the ability to locate and access resources in a boundaryless environment: Directory access services 7 USING TOGAF ADM TOGAF is a “detailed method and a set of supporting tools - for developing an enterprise architec- ture” [4]. The TOGAF Architecture Development Method (ADM – described in Appendix-TOGAF ADM) was used to develop the Boundaryless Information Flow reference model. The first deliverable of the method produced the Interoperable Enterprise Business Scenario [3] that set the context for the enterprise and established the imperative. Without taking this view, a lesser picture would have been produced. The second deliverable produced was the Boundaryless Information Flow Reference Model described in this document. This reference model paints a very large picture of what is needed to address the Boundaryless Information Flow problem. Using the method further will be more difficult in that we are talking about an industry changing, not an organization. Architecture views which enable the architect to ensure that a complex set of requirements are adequately addressed Linkages to practical case studies Guidelines on tools for architecture development 9.1 What is Enterprise Architecture Architecture is “the structure of components, their interrelationships, and the principles and guidelines governing their design and evolution over time.” Enterprise architecture is an extension of the above definition; the extension is based on further describing the components. In a technology architecture the components are typically components such as servers, networks, applications, however in an enterprise architecture the components are broader, they include organizations, processes, humans, data, applications, technology, and more. 8 CONCLUSION Addressing the Boundaryless Information Flow problem is not an easy one. But applying the methods and techniques in the relevant parts of TOGAF has provided a realistic view of the scope of the problem and the further work that is necessary. Following the advise of TOGAF what comes next is to determine what standard interfaces exist for all of the areas covered and populate the architecture with those standards. If standards don’t exist a plan must be established to determine how to fill in those gaps. Taking an enterprise view helps move forward with our eyes wide open. 9 APPENDIX-TOGAF ADM TOGAF is a “detailed method and a set of supporting tools - for developing an enterprise architecture.” [4] The TOGAF Architecture Development Method (ADM) explains how to derive an organization-specific enterprise architecture that addresses business requirements. The ADM provides a reliable, proven way of developing the architecture; architecture views which enable the architect to ensure that a complex set of requirements are adequately addressed; linkages to practical case studies; and guidelines on tools for architecture development. The TOGAF Architecture Development Method (ADM) explains how to derive an organizationspecific enterprise architecture that addresses business requirements. The ADM provides: A reliable, proven way of developing the architecture 10 COPYRIGHT Copyright © 2004 by The Open Group, San Francisco, California, U.S.A. All rights reserved. 11 TRADEMARK Boundaryless Information Flow is a trademark of The Open Group. 12 ACKNOWLEDGMENT This paper is the result of work done by the many members of The Open Group. 13 REFERENCES [1] The Open Group, Boundaryless Information Flow Vision [Online]. Available: http://www.opengroup.org/overview/index.htm [2] The Open Group, The Open Group Making Standards Work [Online]. Available: http://www.opengroup.org/ [3] J. Spencer, T. Blevins (2002), Interoperable Enterprise Business Scenario [Online]. Available: http://www.opengroup.org/cio/iop/index.htm [4] J. Spencer, et al (2004). TOGAF “Enterprise Edition” Version 8.1 [Online]. Available: http://www.opengroup.org/architecture/togaf8doc/arch/ [5] J. Spencer , Architecture Forum [Online]. Available: http://www.opengroup.org/architecture/ [6] J. F. Sowa, J. A. Zachman (1992). Extending and formalizing the framework for information systems architecture, IBM System Journal, Vol 31, No 3, 1992